From de177ec569b0c5bb76c9a8f4a201349beeb802e9 Mon Sep 17 00:00:00 2001 From: team-tf-cdk <84392119+team-tf-cdk@users.noreply.github.com> Date: Mon, 18 Mar 2024 10:42:44 +0100 Subject: [PATCH] feat!: update provider version to `4.0` (#626) Triggered by https://github.com/cdktf/cdktf-repository-manager/actions/runs/8323596409 --------- Signed-off-by: team-tf-cdk --- .projenrc.js | 2 +- README.md | 8 +- cdktf.json | 2 +- docs/API.csharp.md | 2 + docs/API.go.md | 2 + docs/API.java.md | 2 + docs/API.python.md | 2 + docs/API.typescript.md | 2 + docs/adSecretBackend.csharp.md | 166 +-- docs/adSecretBackend.go.md | 178 +-- docs/adSecretBackend.java.md | 262 ++-- docs/adSecretBackend.python.md | 262 ++-- docs/adSecretBackend.typescript.md | 164 +-- docs/adSecretLibrary.csharp.md | 22 +- docs/adSecretLibrary.go.md | 34 +- docs/adSecretLibrary.java.md | 40 +- docs/adSecretLibrary.python.md | 40 +- docs/adSecretLibrary.typescript.md | 22 +- docs/adSecretRole.csharp.md | 18 +- docs/adSecretRole.go.md | 30 +- docs/adSecretRole.java.md | 32 +- docs/adSecretRole.python.md | 32 +- docs/adSecretRole.typescript.md | 18 +- docs/alicloudAuthBackendRole.csharp.md | 34 +- docs/alicloudAuthBackendRole.go.md | 46 +- docs/alicloudAuthBackendRole.java.md | 64 +- docs/alicloudAuthBackendRole.python.md | 64 +- docs/alicloudAuthBackendRole.typescript.md | 34 +- docs/approleAuthBackendLogin.csharp.md | 16 +- docs/approleAuthBackendLogin.go.md | 28 +- docs/approleAuthBackendLogin.java.md | 28 +- docs/approleAuthBackendLogin.python.md | 28 +- docs/approleAuthBackendLogin.typescript.md | 16 +- docs/approleAuthBackendRole.csharp.md | 42 +- docs/approleAuthBackendRole.go.md | 54 +- docs/approleAuthBackendRole.java.md | 80 +- docs/approleAuthBackendRole.python.md | 80 +- docs/approleAuthBackendRole.typescript.md | 42 +- docs/approleAuthBackendRoleSecretId.csharp.md | 24 +- docs/approleAuthBackendRoleSecretId.go.md | 36 +- docs/approleAuthBackendRoleSecretId.java.md | 44 +- docs/approleAuthBackendRoleSecretId.python.md | 44 +- ...proleAuthBackendRoleSecretId.typescript.md | 24 +- docs/audit.csharp.md | 20 +- docs/audit.go.md | 32 +- docs/audit.java.md | 36 +- docs/audit.python.md | 36 +- docs/audit.typescript.md | 20 +- docs/auditRequestHeader.csharp.md | 14 +- docs/auditRequestHeader.go.md | 26 +- docs/auditRequestHeader.java.md | 24 +- docs/auditRequestHeader.python.md | 24 +- docs/auditRequestHeader.typescript.md | 14 +- docs/authBackend.csharp.md | 56 +- docs/authBackend.go.md | 74 +- docs/authBackend.java.md | 76 +- docs/authBackend.python.md | 76 +- docs/authBackend.typescript.md | 56 +- docs/awsAuthBackendCert.csharp.md | 18 +- docs/awsAuthBackendCert.go.md | 30 +- docs/awsAuthBackendCert.java.md | 32 +- docs/awsAuthBackendCert.python.md | 32 +- docs/awsAuthBackendCert.typescript.md | 18 +- docs/awsAuthBackendClient.csharp.md | 28 +- docs/awsAuthBackendClient.go.md | 40 +- docs/awsAuthBackendClient.java.md | 52 +- docs/awsAuthBackendClient.python.md | 52 +- docs/awsAuthBackendClient.typescript.md | 28 +- docs/awsAuthBackendConfigIdentity.csharp.md | 20 +- docs/awsAuthBackendConfigIdentity.go.md | 32 +- docs/awsAuthBackendConfigIdentity.java.md | 36 +- docs/awsAuthBackendConfigIdentity.python.md | 36 +- ...awsAuthBackendConfigIdentity.typescript.md | 20 +- .../awsAuthBackendIdentityWhitelist.csharp.md | 16 +- docs/awsAuthBackendIdentityWhitelist.go.md | 28 +- docs/awsAuthBackendIdentityWhitelist.java.md | 28 +- .../awsAuthBackendIdentityWhitelist.python.md | 28 +- ...AuthBackendIdentityWhitelist.typescript.md | 16 +- docs/awsAuthBackendLogin.csharp.md | 30 +- docs/awsAuthBackendLogin.go.md | 42 +- docs/awsAuthBackendLogin.java.md | 56 +- docs/awsAuthBackendLogin.python.md | 56 +- docs/awsAuthBackendLogin.typescript.md | 30 +- docs/awsAuthBackendRole.csharp.md | 64 +- docs/awsAuthBackendRole.go.md | 76 +- docs/awsAuthBackendRole.java.md | 124 +- docs/awsAuthBackendRole.python.md | 124 +- docs/awsAuthBackendRole.typescript.md | 64 +- docs/awsAuthBackendRoleTag.csharp.md | 24 +- docs/awsAuthBackendRoleTag.go.md | 36 +- docs/awsAuthBackendRoleTag.java.md | 44 +- docs/awsAuthBackendRoleTag.python.md | 44 +- docs/awsAuthBackendRoleTag.typescript.md | 24 +- docs/awsAuthBackendRoletagBlacklist.csharp.md | 16 +- docs/awsAuthBackendRoletagBlacklist.go.md | 28 +- docs/awsAuthBackendRoletagBlacklist.java.md | 28 +- docs/awsAuthBackendRoletagBlacklist.python.md | 28 +- ...sAuthBackendRoletagBlacklist.typescript.md | 16 +- docs/awsAuthBackendStsRole.csharp.md | 16 +- docs/awsAuthBackendStsRole.go.md | 28 +- docs/awsAuthBackendStsRole.java.md | 28 +- docs/awsAuthBackendStsRole.python.md | 28 +- docs/awsAuthBackendStsRole.typescript.md | 16 +- docs/awsSecretBackend.csharp.md | 42 +- docs/awsSecretBackend.go.md | 54 +- docs/awsSecretBackend.java.md | 80 +- docs/awsSecretBackend.python.md | 80 +- docs/awsSecretBackend.typescript.md | 42 +- docs/awsSecretBackendRole.csharp.md | 32 +- docs/awsSecretBackendRole.go.md | 44 +- docs/awsSecretBackendRole.java.md | 60 +- docs/awsSecretBackendRole.python.md | 60 +- docs/awsSecretBackendRole.typescript.md | 32 +- docs/awsSecretBackendStaticRole.csharp.md | 18 +- docs/awsSecretBackendStaticRole.go.md | 30 +- docs/awsSecretBackendStaticRole.java.md | 32 +- docs/awsSecretBackendStaticRole.python.md | 32 +- docs/awsSecretBackendStaticRole.typescript.md | 18 +- docs/azureAuthBackendConfig.csharp.md | 22 +- docs/azureAuthBackendConfig.go.md | 34 +- docs/azureAuthBackendConfig.java.md | 40 +- docs/azureAuthBackendConfig.python.md | 40 +- docs/azureAuthBackendConfig.typescript.md | 22 +- docs/azureAuthBackendRole.csharp.md | 44 +- docs/azureAuthBackendRole.go.md | 56 +- docs/azureAuthBackendRole.java.md | 84 +- docs/azureAuthBackendRole.python.md | 84 +- docs/azureAuthBackendRole.typescript.md | 44 +- docs/azureSecretBackend.csharp.md | 28 +- docs/azureSecretBackend.go.md | 40 +- docs/azureSecretBackend.java.md | 52 +- docs/azureSecretBackend.python.md | 52 +- docs/azureSecretBackend.typescript.md | 28 +- docs/azureSecretBackendRole.csharp.md | 48 +- docs/azureSecretBackendRole.go.md | 72 +- docs/azureSecretBackendRole.java.md | 76 +- docs/azureSecretBackendRole.python.md | 76 +- docs/azureSecretBackendRole.typescript.md | 48 +- docs/certAuthBackendRole.csharp.md | 125 +- docs/certAuthBackendRole.go.md | 137 +- docs/certAuthBackendRole.java.md | 213 ++- docs/certAuthBackendRole.python.md | 213 ++- docs/certAuthBackendRole.typescript.md | 124 +- docs/consulSecretBackend.csharp.md | 36 +- docs/consulSecretBackend.go.md | 48 +- docs/consulSecretBackend.java.md | 68 +- docs/consulSecretBackend.python.md | 68 +- docs/consulSecretBackend.typescript.md | 36 +- docs/consulSecretBackendRole.csharp.md | 79 +- docs/consulSecretBackendRole.go.md | 91 +- docs/consulSecretBackendRole.java.md | 121 +- docs/consulSecretBackendRole.python.md | 121 +- docs/consulSecretBackendRole.typescript.md | 78 +- docs/dataVaultAdAccessCredentials.csharp.md | 14 +- docs/dataVaultAdAccessCredentials.go.md | 26 +- docs/dataVaultAdAccessCredentials.java.md | 24 +- docs/dataVaultAdAccessCredentials.python.md | 24 +- ...dataVaultAdAccessCredentials.typescript.md | 14 +- ...ataVaultApproleAuthBackendRoleId.csharp.md | 14 +- docs/dataVaultApproleAuthBackendRoleId.go.md | 26 +- .../dataVaultApproleAuthBackendRoleId.java.md | 24 +- ...ataVaultApproleAuthBackendRoleId.python.md | 24 +- ...aultApproleAuthBackendRoleId.typescript.md | 14 +- docs/dataVaultAuthBackend.csharp.md | 12 +- docs/dataVaultAuthBackend.go.md | 24 +- docs/dataVaultAuthBackend.java.md | 20 +- docs/dataVaultAuthBackend.python.md | 20 +- docs/dataVaultAuthBackend.typescript.md | 12 +- docs/dataVaultAuthBackends.csharp.md | 12 +- docs/dataVaultAuthBackends.go.md | 24 +- docs/dataVaultAuthBackends.java.md | 20 +- docs/dataVaultAuthBackends.python.md | 20 +- docs/dataVaultAuthBackends.typescript.md | 12 +- docs/dataVaultAwsAccessCredentials.csharp.md | 22 +- docs/dataVaultAwsAccessCredentials.go.md | 34 +- docs/dataVaultAwsAccessCredentials.java.md | 40 +- docs/dataVaultAwsAccessCredentials.python.md | 40 +- ...ataVaultAwsAccessCredentials.typescript.md | 22 +- ...aVaultAwsStaticAccessCredentials.csharp.md | 14 +- .../dataVaultAwsStaticAccessCredentials.go.md | 26 +- ...ataVaultAwsStaticAccessCredentials.java.md | 24 +- ...aVaultAwsStaticAccessCredentials.python.md | 24 +- ...ltAwsStaticAccessCredentials.typescript.md | 14 +- .../dataVaultAzureAccessCredentials.csharp.md | 28 +- docs/dataVaultAzureAccessCredentials.go.md | 40 +- docs/dataVaultAzureAccessCredentials.java.md | 52 +- .../dataVaultAzureAccessCredentials.python.md | 52 +- ...aVaultAzureAccessCredentials.typescript.md | 28 +- docs/dataVaultGcpAuthBackendRole.csharp.md | 32 +- docs/dataVaultGcpAuthBackendRole.go.md | 44 +- docs/dataVaultGcpAuthBackendRole.java.md | 60 +- docs/dataVaultGcpAuthBackendRole.python.md | 60 +- .../dataVaultGcpAuthBackendRole.typescript.md | 32 +- docs/dataVaultGenericSecret.csharp.md | 18 +- docs/dataVaultGenericSecret.go.md | 30 +- docs/dataVaultGenericSecret.java.md | 32 +- docs/dataVaultGenericSecret.python.md | 32 +- docs/dataVaultGenericSecret.typescript.md | 18 +- docs/dataVaultIdentityEntity.csharp.md | 20 +- docs/dataVaultIdentityEntity.go.md | 38 +- docs/dataVaultIdentityEntity.java.md | 36 +- docs/dataVaultIdentityEntity.python.md | 36 +- docs/dataVaultIdentityEntity.typescript.md | 20 +- docs/dataVaultIdentityGroup.csharp.md | 20 +- docs/dataVaultIdentityGroup.go.md | 32 +- docs/dataVaultIdentityGroup.java.md | 36 +- docs/dataVaultIdentityGroup.python.md | 36 +- docs/dataVaultIdentityGroup.typescript.md | 20 +- ...dataVaultIdentityOidcClientCreds.csharp.md | 12 +- docs/dataVaultIdentityOidcClientCreds.go.md | 24 +- docs/dataVaultIdentityOidcClientCreds.java.md | 20 +- ...dataVaultIdentityOidcClientCreds.python.md | 20 +- ...VaultIdentityOidcClientCreds.typescript.md | 12 +- ...ataVaultIdentityOidcOpenidConfig.csharp.md | 12 +- docs/dataVaultIdentityOidcOpenidConfig.go.md | 24 +- .../dataVaultIdentityOidcOpenidConfig.java.md | 20 +- ...ataVaultIdentityOidcOpenidConfig.python.md | 20 +- ...aultIdentityOidcOpenidConfig.typescript.md | 12 +- .../dataVaultIdentityOidcPublicKeys.csharp.md | 12 +- docs/dataVaultIdentityOidcPublicKeys.go.md | 24 +- docs/dataVaultIdentityOidcPublicKeys.java.md | 20 +- .../dataVaultIdentityOidcPublicKeys.python.md | 20 +- ...aVaultIdentityOidcPublicKeys.typescript.md | 12 +- ...VaultKubernetesAuthBackendConfig.csharp.md | 24 +- ...dataVaultKubernetesAuthBackendConfig.go.md | 36 +- ...taVaultKubernetesAuthBackendConfig.java.md | 44 +- ...VaultKubernetesAuthBackendConfig.python.md | 44 +- ...tKubernetesAuthBackendConfig.typescript.md | 24 +- ...taVaultKubernetesAuthBackendRole.csharp.md | 34 +- docs/dataVaultKubernetesAuthBackendRole.go.md | 46 +- ...dataVaultKubernetesAuthBackendRole.java.md | 64 +- ...taVaultKubernetesAuthBackendRole.python.md | 64 +- ...ultKubernetesAuthBackendRole.typescript.md | 34 +- ...ultKubernetesServiceAccountToken.csharp.md | 20 +- ...taVaultKubernetesServiceAccountToken.go.md | 32 +- ...VaultKubernetesServiceAccountToken.java.md | 36 +- ...ultKubernetesServiceAccountToken.python.md | 36 +- ...ubernetesServiceAccountToken.typescript.md | 20 +- docs/dataVaultKvSecret.csharp.md | 12 +- docs/dataVaultKvSecret.go.md | 24 +- docs/dataVaultKvSecret.java.md | 20 +- docs/dataVaultKvSecret.python.md | 20 +- docs/dataVaultKvSecret.typescript.md | 12 +- docs/dataVaultKvSecretSubkeysV2.csharp.md | 18 +- docs/dataVaultKvSecretSubkeysV2.go.md | 30 +- docs/dataVaultKvSecretSubkeysV2.java.md | 32 +- docs/dataVaultKvSecretSubkeysV2.python.md | 32 +- docs/dataVaultKvSecretSubkeysV2.typescript.md | 18 +- docs/dataVaultKvSecretV2.csharp.md | 16 +- docs/dataVaultKvSecretV2.go.md | 28 +- docs/dataVaultKvSecretV2.java.md | 28 +- docs/dataVaultKvSecretV2.python.md | 28 +- docs/dataVaultKvSecretV2.typescript.md | 16 +- docs/dataVaultKvSecretsList.csharp.md | 12 +- docs/dataVaultKvSecretsList.go.md | 24 +- docs/dataVaultKvSecretsList.java.md | 20 +- docs/dataVaultKvSecretsList.python.md | 20 +- docs/dataVaultKvSecretsList.typescript.md | 12 +- docs/dataVaultKvSecretsListV2.csharp.md | 14 +- docs/dataVaultKvSecretsListV2.go.md | 26 +- docs/dataVaultKvSecretsListV2.java.md | 24 +- docs/dataVaultKvSecretsListV2.python.md | 24 +- docs/dataVaultKvSecretsListV2.typescript.md | 14 +- .../dataVaultLdapDynamicCredentials.csharp.md | 14 +- docs/dataVaultLdapDynamicCredentials.go.md | 26 +- docs/dataVaultLdapDynamicCredentials.java.md | 24 +- .../dataVaultLdapDynamicCredentials.python.md | 24 +- ...aVaultLdapDynamicCredentials.typescript.md | 14 +- docs/dataVaultLdapStaticCredentials.csharp.md | 14 +- docs/dataVaultLdapStaticCredentials.go.md | 26 +- docs/dataVaultLdapStaticCredentials.java.md | 24 +- docs/dataVaultLdapStaticCredentials.python.md | 24 +- ...taVaultLdapStaticCredentials.typescript.md | 14 +- docs/dataVaultNomadAccessToken.csharp.md | 14 +- docs/dataVaultNomadAccessToken.go.md | 26 +- docs/dataVaultNomadAccessToken.java.md | 24 +- docs/dataVaultNomadAccessToken.python.md | 24 +- docs/dataVaultNomadAccessToken.typescript.md | 14 +- .../dataVaultPkiSecretBackendIssuer.csharp.md | 14 +- docs/dataVaultPkiSecretBackendIssuer.go.md | 26 +- docs/dataVaultPkiSecretBackendIssuer.java.md | 24 +- .../dataVaultPkiSecretBackendIssuer.python.md | 24 +- ...aVaultPkiSecretBackendIssuer.typescript.md | 14 +- ...dataVaultPkiSecretBackendIssuers.csharp.md | 12 +- docs/dataVaultPkiSecretBackendIssuers.go.md | 24 +- docs/dataVaultPkiSecretBackendIssuers.java.md | 20 +- ...dataVaultPkiSecretBackendIssuers.python.md | 20 +- ...VaultPkiSecretBackendIssuers.typescript.md | 12 +- docs/dataVaultPkiSecretBackendKey.csharp.md | 14 +- docs/dataVaultPkiSecretBackendKey.go.md | 26 +- docs/dataVaultPkiSecretBackendKey.java.md | 24 +- docs/dataVaultPkiSecretBackendKey.python.md | 24 +- ...dataVaultPkiSecretBackendKey.typescript.md | 14 +- docs/dataVaultPkiSecretBackendKeys.csharp.md | 12 +- docs/dataVaultPkiSecretBackendKeys.go.md | 24 +- docs/dataVaultPkiSecretBackendKeys.java.md | 20 +- docs/dataVaultPkiSecretBackendKeys.python.md | 20 +- ...ataVaultPkiSecretBackendKeys.typescript.md | 12 +- docs/dataVaultPolicyDocument.csharp.md | 56 +- docs/dataVaultPolicyDocument.go.md | 86 +- docs/dataVaultPolicyDocument.java.md | 64 +- docs/dataVaultPolicyDocument.python.md | 64 +- docs/dataVaultPolicyDocument.typescript.md | 56 +- docs/dataVaultRaftAutopilotState.csharp.md | 10 +- docs/dataVaultRaftAutopilotState.go.md | 22 +- docs/dataVaultRaftAutopilotState.java.md | 16 +- docs/dataVaultRaftAutopilotState.python.md | 16 +- .../dataVaultRaftAutopilotState.typescript.md | 10 +- docs/dataVaultTransformDecode.csharp.md | 26 +- docs/dataVaultTransformDecode.go.md | 38 +- docs/dataVaultTransformDecode.java.md | 48 +- docs/dataVaultTransformDecode.python.md | 48 +- docs/dataVaultTransformDecode.typescript.md | 26 +- docs/dataVaultTransformEncode.csharp.md | 26 +- docs/dataVaultTransformEncode.go.md | 38 +- docs/dataVaultTransformEncode.java.md | 48 +- docs/dataVaultTransformEncode.python.md | 48 +- docs/dataVaultTransformEncode.typescript.md | 26 +- docs/dataVaultTransitDecrypt.csharp.md | 18 +- docs/dataVaultTransitDecrypt.go.md | 30 +- docs/dataVaultTransitDecrypt.java.md | 32 +- docs/dataVaultTransitDecrypt.python.md | 32 +- docs/dataVaultTransitDecrypt.typescript.md | 18 +- docs/dataVaultTransitEncrypt.csharp.md | 20 +- docs/dataVaultTransitEncrypt.go.md | 32 +- docs/dataVaultTransitEncrypt.java.md | 36 +- docs/dataVaultTransitEncrypt.python.md | 36 +- docs/dataVaultTransitEncrypt.typescript.md | 20 +- .../databaseSecretBackendConnection.csharp.md | 366 +++--- docs/databaseSecretBackendConnection.go.md | 486 +++---- docs/databaseSecretBackendConnection.java.md | 422 +++--- .../databaseSecretBackendConnection.python.md | 728 +++++------ ...abaseSecretBackendConnection.typescript.md | 366 +++--- docs/databaseSecretBackendRole.csharp.md | 32 +- docs/databaseSecretBackendRole.go.md | 44 +- docs/databaseSecretBackendRole.java.md | 60 +- docs/databaseSecretBackendRole.python.md | 60 +- docs/databaseSecretBackendRole.typescript.md | 32 +- .../databaseSecretBackendStaticRole.csharp.md | 26 +- docs/databaseSecretBackendStaticRole.go.md | 38 +- docs/databaseSecretBackendStaticRole.java.md | 48 +- .../databaseSecretBackendStaticRole.python.md | 48 +- ...abaseSecretBackendStaticRole.typescript.md | 26 +- docs/databaseSecretsMount.csharp.md | 590 ++++----- docs/databaseSecretsMount.go.md | 710 +++++----- docs/databaseSecretsMount.java.md | 654 +++++----- docs/databaseSecretsMount.python.md | 654 +++++----- docs/databaseSecretsMount.typescript.md | 590 ++++----- docs/egpPolicy.csharp.md | 18 +- docs/egpPolicy.go.md | 30 +- docs/egpPolicy.java.md | 32 +- docs/egpPolicy.python.md | 32 +- docs/egpPolicy.typescript.md | 18 +- docs/gcpAuthBackend.csharp.md | 88 +- docs/gcpAuthBackend.go.md | 112 +- docs/gcpAuthBackend.java.md | 132 +- docs/gcpAuthBackend.python.md | 140 +- docs/gcpAuthBackend.typescript.md | 88 +- docs/gcpAuthBackendRole.csharp.md | 76 +- docs/gcpAuthBackendRole.go.md | 88 +- docs/gcpAuthBackendRole.java.md | 148 +-- docs/gcpAuthBackendRole.python.md | 148 +-- docs/gcpAuthBackendRole.typescript.md | 76 +- docs/gcpSecretBackend.csharp.md | 24 +- docs/gcpSecretBackend.go.md | 36 +- docs/gcpSecretBackend.java.md | 44 +- docs/gcpSecretBackend.python.md | 44 +- docs/gcpSecretBackend.typescript.md | 24 +- docs/gcpSecretImpersonatedAccount.csharp.md | 18 +- docs/gcpSecretImpersonatedAccount.go.md | 30 +- docs/gcpSecretImpersonatedAccount.java.md | 32 +- docs/gcpSecretImpersonatedAccount.python.md | 32 +- ...gcpSecretImpersonatedAccount.typescript.md | 18 +- docs/gcpSecretRoleset.csharp.md | 26 +- docs/gcpSecretRoleset.go.md | 44 +- docs/gcpSecretRoleset.java.md | 44 +- docs/gcpSecretRoleset.python.md | 44 +- docs/gcpSecretRoleset.typescript.md | 26 +- docs/gcpSecretStaticAccount.csharp.md | 26 +- docs/gcpSecretStaticAccount.go.md | 44 +- docs/gcpSecretStaticAccount.java.md | 44 +- docs/gcpSecretStaticAccount.python.md | 44 +- docs/gcpSecretStaticAccount.typescript.md | 26 +- docs/genericEndpoint.csharp.md | 22 +- docs/genericEndpoint.go.md | 34 +- docs/genericEndpoint.java.md | 40 +- docs/genericEndpoint.python.md | 40 +- docs/genericEndpoint.typescript.md | 22 +- docs/genericSecret.csharp.md | 18 +- docs/genericSecret.go.md | 30 +- docs/genericSecret.java.md | 32 +- docs/genericSecret.python.md | 32 +- docs/genericSecret.typescript.md | 18 +- docs/githubAuthBackend.csharp.md | 76 +- docs/githubAuthBackend.go.md | 94 +- docs/githubAuthBackend.java.md | 116 +- docs/githubAuthBackend.python.md | 116 +- docs/githubAuthBackend.typescript.md | 76 +- docs/githubTeam.csharp.md | 16 +- docs/githubTeam.go.md | 28 +- docs/githubTeam.java.md | 28 +- docs/githubTeam.python.md | 28 +- docs/githubTeam.typescript.md | 16 +- docs/githubUser.csharp.md | 16 +- docs/githubUser.go.md | 28 +- docs/githubUser.java.md | 28 +- docs/githubUser.python.md | 28 +- docs/githubUser.typescript.md | 16 +- docs/identityEntity.csharp.md | 20 +- docs/identityEntity.go.md | 32 +- docs/identityEntity.java.md | 36 +- docs/identityEntity.python.md | 36 +- docs/identityEntity.typescript.md | 20 +- docs/identityEntityAlias.csharp.md | 18 +- docs/identityEntityAlias.go.md | 30 +- docs/identityEntityAlias.java.md | 32 +- docs/identityEntityAlias.python.md | 32 +- docs/identityEntityAlias.typescript.md | 18 +- docs/identityEntityPolicies.csharp.md | 16 +- docs/identityEntityPolicies.go.md | 28 +- docs/identityEntityPolicies.java.md | 28 +- docs/identityEntityPolicies.python.md | 28 +- docs/identityEntityPolicies.typescript.md | 16 +- docs/identityGroup.csharp.md | 28 +- docs/identityGroup.go.md | 40 +- docs/identityGroup.java.md | 52 +- docs/identityGroup.python.md | 52 +- docs/identityGroup.typescript.md | 28 +- docs/identityGroupAlias.csharp.md | 16 +- docs/identityGroupAlias.go.md | 28 +- docs/identityGroupAlias.java.md | 28 +- docs/identityGroupAlias.python.md | 28 +- docs/identityGroupAlias.typescript.md | 16 +- docs/identityGroupMemberEntityIds.csharp.md | 27 +- docs/identityGroupMemberEntityIds.go.md | 39 +- docs/identityGroupMemberEntityIds.java.md | 39 +- docs/identityGroupMemberEntityIds.python.md | 39 +- ...identityGroupMemberEntityIds.typescript.md | 27 +- docs/identityGroupMemberGroupIds.csharp.md | 16 +- docs/identityGroupMemberGroupIds.go.md | 28 +- docs/identityGroupMemberGroupIds.java.md | 28 +- docs/identityGroupMemberGroupIds.python.md | 28 +- .../identityGroupMemberGroupIds.typescript.md | 16 +- docs/identityGroupPolicies.csharp.md | 16 +- docs/identityGroupPolicies.go.md | 28 +- docs/identityGroupPolicies.java.md | 28 +- docs/identityGroupPolicies.python.md | 28 +- docs/identityGroupPolicies.typescript.md | 16 +- docs/identityMfaDuo.csharp.md | 22 +- docs/identityMfaDuo.go.md | 34 +- docs/identityMfaDuo.java.md | 40 +- docs/identityMfaDuo.python.md | 40 +- docs/identityMfaDuo.typescript.md | 22 +- docs/identityMfaLoginEnforcement.csharp.md | 22 +- docs/identityMfaLoginEnforcement.go.md | 34 +- docs/identityMfaLoginEnforcement.java.md | 40 +- docs/identityMfaLoginEnforcement.python.md | 40 +- .../identityMfaLoginEnforcement.typescript.md | 22 +- docs/identityMfaOkta.csharp.md | 20 +- docs/identityMfaOkta.go.md | 32 +- docs/identityMfaOkta.java.md | 36 +- docs/identityMfaOkta.python.md | 36 +- docs/identityMfaOkta.typescript.md | 20 +- docs/identityMfaPingid.csharp.md | 14 +- docs/identityMfaPingid.go.md | 26 +- docs/identityMfaPingid.java.md | 24 +- docs/identityMfaPingid.python.md | 24 +- docs/identityMfaPingid.typescript.md | 14 +- docs/identityMfaTotp.csharp.md | 26 +- docs/identityMfaTotp.go.md | 38 +- docs/identityMfaTotp.java.md | 48 +- docs/identityMfaTotp.python.md | 48 +- docs/identityMfaTotp.typescript.md | 26 +- docs/identityOidc.csharp.md | 12 +- docs/identityOidc.go.md | 24 +- docs/identityOidc.java.md | 20 +- docs/identityOidc.python.md | 20 +- docs/identityOidc.typescript.md | 12 +- docs/identityOidcAssignment.csharp.md | 16 +- docs/identityOidcAssignment.go.md | 28 +- docs/identityOidcAssignment.java.md | 28 +- docs/identityOidcAssignment.python.md | 28 +- docs/identityOidcAssignment.typescript.md | 16 +- docs/identityOidcClient.csharp.md | 24 +- docs/identityOidcClient.go.md | 36 +- docs/identityOidcClient.java.md | 44 +- docs/identityOidcClient.python.md | 44 +- docs/identityOidcClient.typescript.md | 24 +- docs/identityOidcKey.csharp.md | 20 +- docs/identityOidcKey.go.md | 32 +- docs/identityOidcKey.java.md | 36 +- docs/identityOidcKey.python.md | 36 +- docs/identityOidcKey.typescript.md | 20 +- docs/identityOidcKeyAllowedClientId.csharp.md | 14 +- docs/identityOidcKeyAllowedClientId.go.md | 26 +- docs/identityOidcKeyAllowedClientId.java.md | 24 +- docs/identityOidcKeyAllowedClientId.python.md | 24 +- ...entityOidcKeyAllowedClientId.typescript.md | 14 +- docs/identityOidcProvider.csharp.md | 20 +- docs/identityOidcProvider.go.md | 32 +- docs/identityOidcProvider.java.md | 36 +- docs/identityOidcProvider.python.md | 36 +- docs/identityOidcProvider.typescript.md | 20 +- docs/identityOidcRole.csharp.md | 20 +- docs/identityOidcRole.go.md | 32 +- docs/identityOidcRole.java.md | 36 +- docs/identityOidcRole.python.md | 36 +- docs/identityOidcRole.typescript.md | 20 +- docs/identityOidcScope.csharp.md | 16 +- docs/identityOidcScope.go.md | 28 +- docs/identityOidcScope.java.md | 28 +- docs/identityOidcScope.python.md | 28 +- docs/identityOidcScope.typescript.md | 16 +- docs/jwtAuthBackend.csharp.md | 84 +- docs/jwtAuthBackend.go.md | 102 +- docs/jwtAuthBackend.java.md | 132 +- docs/jwtAuthBackend.python.md | 132 +- docs/jwtAuthBackend.typescript.md | 84 +- docs/jwtAuthBackendRole.csharp.md | 66 +- docs/jwtAuthBackendRole.go.md | 78 +- docs/jwtAuthBackendRole.java.md | 128 +- docs/jwtAuthBackendRole.python.md | 128 +- docs/jwtAuthBackendRole.typescript.md | 66 +- docs/kmipSecretBackend.csharp.md | 34 +- docs/kmipSecretBackend.go.md | 46 +- docs/kmipSecretBackend.java.md | 64 +- docs/kmipSecretBackend.python.md | 64 +- docs/kmipSecretBackend.typescript.md | 34 +- docs/kmipSecretRole.csharp.md | 50 +- docs/kmipSecretRole.go.md | 62 +- docs/kmipSecretRole.java.md | 96 +- docs/kmipSecretRole.python.md | 96 +- docs/kmipSecretRole.typescript.md | 50 +- docs/kmipSecretScope.csharp.md | 16 +- docs/kmipSecretScope.go.md | 28 +- docs/kmipSecretScope.java.md | 28 +- docs/kmipSecretScope.python.md | 28 +- docs/kmipSecretScope.typescript.md | 16 +- docs/kubernetesAuthBackendConfig.csharp.md | 26 +- docs/kubernetesAuthBackendConfig.go.md | 38 +- docs/kubernetesAuthBackendConfig.java.md | 48 +- docs/kubernetesAuthBackendConfig.python.md | 48 +- .../kubernetesAuthBackendConfig.typescript.md | 26 +- docs/kubernetesAuthBackendRole.csharp.md | 40 +- docs/kubernetesAuthBackendRole.go.md | 52 +- docs/kubernetesAuthBackendRole.java.md | 76 +- docs/kubernetesAuthBackendRole.python.md | 76 +- docs/kubernetesAuthBackendRole.typescript.md | 40 +- docs/kubernetesSecretBackend.csharp.md | 40 +- docs/kubernetesSecretBackend.go.md | 52 +- docs/kubernetesSecretBackend.java.md | 76 +- docs/kubernetesSecretBackend.python.md | 76 +- docs/kubernetesSecretBackend.typescript.md | 40 +- docs/kubernetesSecretBackendRole.csharp.md | 34 +- docs/kubernetesSecretBackendRole.go.md | 46 +- docs/kubernetesSecretBackendRole.java.md | 64 +- docs/kubernetesSecretBackendRole.python.md | 64 +- .../kubernetesSecretBackendRole.typescript.md | 34 +- docs/kvSecret.csharp.md | 14 +- docs/kvSecret.go.md | 26 +- docs/kvSecret.java.md | 24 +- docs/kvSecret.python.md | 24 +- docs/kvSecret.typescript.md | 14 +- docs/kvSecretBackendV2.csharp.md | 18 +- docs/kvSecretBackendV2.go.md | 30 +- docs/kvSecretBackendV2.java.md | 32 +- docs/kvSecretBackendV2.python.md | 32 +- docs/kvSecretBackendV2.typescript.md | 18 +- docs/kvSecretV2.csharp.md | 34 +- docs/kvSecretV2.go.md | 52 +- docs/kvSecretV2.java.md | 56 +- docs/kvSecretV2.python.md | 64 +- docs/kvSecretV2.typescript.md | 34 +- docs/ldapAuthBackend.csharp.md | 130 +- docs/ldapAuthBackend.go.md | 142 +- docs/ldapAuthBackend.java.md | 256 ++-- docs/ldapAuthBackend.python.md | 256 ++-- docs/ldapAuthBackend.typescript.md | 130 +- docs/ldapAuthBackendGroup.csharp.md | 22 +- docs/ldapAuthBackendGroup.go.md | 34 +- docs/ldapAuthBackendGroup.java.md | 40 +- docs/ldapAuthBackendGroup.python.md | 40 +- docs/ldapAuthBackendGroup.typescript.md | 22 +- docs/ldapAuthBackendUser.csharp.md | 26 +- docs/ldapAuthBackendUser.go.md | 38 +- docs/ldapAuthBackendUser.java.md | 48 +- docs/ldapAuthBackendUser.python.md | 48 +- docs/ldapAuthBackendUser.typescript.md | 26 +- docs/ldapSecretBackend.csharp.md | 154 +-- docs/ldapSecretBackend.go.md | 166 +-- docs/ldapSecretBackend.java.md | 240 ++-- docs/ldapSecretBackend.python.md | 238 ++-- docs/ldapSecretBackend.typescript.md | 152 +-- docs/ldapSecretBackendDynamicRole.csharp.md | 26 +- docs/ldapSecretBackendDynamicRole.go.md | 38 +- docs/ldapSecretBackendDynamicRole.java.md | 48 +- docs/ldapSecretBackendDynamicRole.python.md | 48 +- ...ldapSecretBackendDynamicRole.typescript.md | 26 +- docs/ldapSecretBackendLibrarySet.csharp.md | 22 +- docs/ldapSecretBackendLibrarySet.go.md | 34 +- docs/ldapSecretBackendLibrarySet.java.md | 40 +- docs/ldapSecretBackendLibrarySet.python.md | 40 +- .../ldapSecretBackendLibrarySet.typescript.md | 22 +- docs/ldapSecretBackendStaticRole.csharp.md | 67 +- docs/ldapSecretBackendStaticRole.go.md | 77 +- docs/ldapSecretBackendStaticRole.java.md | 95 +- docs/ldapSecretBackendStaticRole.python.md | 97 +- .../ldapSecretBackendStaticRole.typescript.md | 64 +- docs/managedKeys.csharp.md | 100 +- docs/managedKeys.go.md | 130 +- docs/managedKeys.java.md | 112 +- docs/managedKeys.python.md | 112 +- docs/managedKeys.typescript.md | 100 +- docs/mfaDuo.csharp.md | 24 +- docs/mfaDuo.go.md | 36 +- docs/mfaDuo.java.md | 44 +- docs/mfaDuo.python.md | 44 +- docs/mfaDuo.typescript.md | 24 +- docs/mfaOkta.csharp.md | 22 +- docs/mfaOkta.go.md | 34 +- docs/mfaOkta.java.md | 40 +- docs/mfaOkta.python.md | 40 +- docs/mfaOkta.typescript.md | 22 +- docs/mfaPingid.csharp.md | 16 +- docs/mfaPingid.go.md | 28 +- docs/mfaPingid.java.md | 28 +- docs/mfaPingid.python.md | 28 +- docs/mfaPingid.typescript.md | 16 +- docs/mfaTotp.csharp.md | 24 +- docs/mfaTotp.go.md | 36 +- docs/mfaTotp.java.md | 44 +- docs/mfaTotp.python.md | 44 +- docs/mfaTotp.typescript.md | 24 +- docs/mongodbatlasSecretBackend.csharp.md | 16 +- docs/mongodbatlasSecretBackend.go.md | 28 +- docs/mongodbatlasSecretBackend.java.md | 28 +- docs/mongodbatlasSecretBackend.python.md | 28 +- docs/mongodbatlasSecretBackend.typescript.md | 16 +- docs/mongodbatlasSecretRole.csharp.md | 30 +- docs/mongodbatlasSecretRole.go.md | 42 +- docs/mongodbatlasSecretRole.java.md | 56 +- docs/mongodbatlasSecretRole.python.md | 56 +- docs/mongodbatlasSecretRole.typescript.md | 30 +- docs/mount.csharp.md | 34 +- docs/mount.go.md | 46 +- docs/mount.java.md | 64 +- docs/mount.python.md | 64 +- docs/mount.typescript.md | 34 +- docs/namespace.csharp.md | 16 +- docs/namespace.go.md | 28 +- docs/namespace.java.md | 28 +- docs/namespace.python.md | 28 +- docs/namespace.typescript.md | 16 +- docs/nomadSecretBackend.csharp.md | 38 +- docs/nomadSecretBackend.go.md | 50 +- docs/nomadSecretBackend.java.md | 72 +- docs/nomadSecretBackend.python.md | 72 +- docs/nomadSecretBackend.typescript.md | 38 +- docs/nomadSecretRole.csharp.md | 20 +- docs/nomadSecretRole.go.md | 32 +- docs/nomadSecretRole.java.md | 36 +- docs/nomadSecretRole.python.md | 36 +- docs/nomadSecretRole.typescript.md | 20 +- docs/oktaAuthBackend.csharp.md | 56 +- docs/oktaAuthBackend.go.md | 80 +- docs/oktaAuthBackend.java.md | 88 +- docs/oktaAuthBackend.python.md | 88 +- docs/oktaAuthBackend.typescript.md | 56 +- docs/oktaAuthBackendGroup.csharp.md | 16 +- docs/oktaAuthBackendGroup.go.md | 28 +- docs/oktaAuthBackendGroup.java.md | 28 +- docs/oktaAuthBackendGroup.python.md | 28 +- docs/oktaAuthBackendGroup.typescript.md | 16 +- docs/oktaAuthBackendUser.csharp.md | 18 +- docs/oktaAuthBackendUser.go.md | 30 +- docs/oktaAuthBackendUser.java.md | 32 +- docs/oktaAuthBackendUser.python.md | 32 +- docs/oktaAuthBackendUser.typescript.md | 18 +- docs/passwordPolicy.csharp.md | 14 +- docs/passwordPolicy.go.md | 26 +- docs/passwordPolicy.java.md | 24 +- docs/passwordPolicy.python.md | 24 +- docs/passwordPolicy.typescript.md | 14 +- docs/pkiSecretBackendCert.csharp.md | 42 +- docs/pkiSecretBackendCert.go.md | 54 +- docs/pkiSecretBackendCert.java.md | 80 +- docs/pkiSecretBackendCert.python.md | 80 +- docs/pkiSecretBackendCert.typescript.md | 42 +- docs/pkiSecretBackendConfigCa.csharp.md | 14 +- docs/pkiSecretBackendConfigCa.go.md | 26 +- docs/pkiSecretBackendConfigCa.java.md | 24 +- docs/pkiSecretBackendConfigCa.python.md | 24 +- docs/pkiSecretBackendConfigCa.typescript.md | 14 +- docs/pkiSecretBackendConfigCluster.csharp.md | 987 ++++++++++++++ docs/pkiSecretBackendConfigCluster.go.md | 987 ++++++++++++++ docs/pkiSecretBackendConfigCluster.java.md | 1108 ++++++++++++++++ docs/pkiSecretBackendConfigCluster.python.md | 1148 +++++++++++++++++ ...kiSecretBackendConfigCluster.typescript.md | 974 ++++++++++++++ docs/pkiSecretBackendConfigIssuers.csharp.md | 16 +- docs/pkiSecretBackendConfigIssuers.go.md | 28 +- docs/pkiSecretBackendConfigIssuers.java.md | 28 +- docs/pkiSecretBackendConfigIssuers.python.md | 28 +- ...kiSecretBackendConfigIssuers.typescript.md | 16 +- docs/pkiSecretBackendConfigUrls.csharp.md | 63 +- docs/pkiSecretBackendConfigUrls.go.md | 75 +- docs/pkiSecretBackendConfigUrls.java.md | 91 +- docs/pkiSecretBackendConfigUrls.python.md | 89 +- docs/pkiSecretBackendConfigUrls.typescript.md | 62 +- docs/pkiSecretBackendCrlConfig.csharp.md | 34 +- docs/pkiSecretBackendCrlConfig.go.md | 46 +- docs/pkiSecretBackendCrlConfig.java.md | 64 +- docs/pkiSecretBackendCrlConfig.python.md | 64 +- docs/pkiSecretBackendCrlConfig.typescript.md | 34 +- ...etBackendIntermediateCertRequest.csharp.md | 58 +- ...SecretBackendIntermediateCertRequest.go.md | 70 +- ...cretBackendIntermediateCertRequest.java.md | 112 +- ...etBackendIntermediateCertRequest.python.md | 112 +- ...ckendIntermediateCertRequest.typescript.md | 58 +- ...cretBackendIntermediateSetSigned.csharp.md | 14 +- ...kiSecretBackendIntermediateSetSigned.go.md | 26 +- ...SecretBackendIntermediateSetSigned.java.md | 24 +- ...cretBackendIntermediateSetSigned.python.md | 24 +- ...BackendIntermediateSetSigned.typescript.md | 14 +- docs/pkiSecretBackendIssuer.csharp.md | 32 +- docs/pkiSecretBackendIssuer.go.md | 44 +- docs/pkiSecretBackendIssuer.java.md | 60 +- docs/pkiSecretBackendIssuer.python.md | 60 +- docs/pkiSecretBackendIssuer.typescript.md | 32 +- docs/pkiSecretBackendKey.csharp.md | 24 +- docs/pkiSecretBackendKey.go.md | 36 +- docs/pkiSecretBackendKey.java.md | 44 +- docs/pkiSecretBackendKey.python.md | 44 +- docs/pkiSecretBackendKey.typescript.md | 24 +- docs/pkiSecretBackendRole.csharp.md | 106 +- docs/pkiSecretBackendRole.go.md | 124 +- docs/pkiSecretBackendRole.java.md | 202 +-- docs/pkiSecretBackendRole.python.md | 202 +-- docs/pkiSecretBackendRole.typescript.md | 106 +- docs/pkiSecretBackendRootCert.csharp.md | 75 +- docs/pkiSecretBackendRootCert.go.md | 87 +- docs/pkiSecretBackendRootCert.java.md | 135 +- docs/pkiSecretBackendRootCert.python.md | 135 +- docs/pkiSecretBackendRootCert.typescript.md | 75 +- ...ecretBackendRootSignIntermediate.csharp.md | 65 +- ...pkiSecretBackendRootSignIntermediate.go.md | 77 +- ...iSecretBackendRootSignIntermediate.java.md | 115 +- ...ecretBackendRootSignIntermediate.python.md | 115 +- ...tBackendRootSignIntermediate.typescript.md | 65 +- docs/pkiSecretBackendSign.csharp.md | 49 +- docs/pkiSecretBackendSign.go.md | 61 +- docs/pkiSecretBackendSign.java.md | 83 +- docs/pkiSecretBackendSign.python.md | 83 +- docs/pkiSecretBackendSign.typescript.md | 49 +- docs/policy.csharp.md | 14 +- docs/policy.go.md | 26 +- docs/policy.java.md | 24 +- docs/policy.python.md | 24 +- docs/policy.typescript.md | 14 +- docs/provider.csharp.md | 254 ++-- docs/provider.go.md | 320 ++--- docs/provider.java.md | 316 ++--- docs/provider.python.md | 316 ++--- docs/provider.typescript.md | 254 ++-- docs/quotaLeaseCount.csharp.md | 18 +- docs/quotaLeaseCount.go.md | 30 +- docs/quotaLeaseCount.java.md | 32 +- docs/quotaLeaseCount.python.md | 32 +- docs/quotaLeaseCount.typescript.md | 18 +- docs/quotaRateLimit.csharp.md | 22 +- docs/quotaRateLimit.go.md | 34 +- docs/quotaRateLimit.java.md | 40 +- docs/quotaRateLimit.python.md | 40 +- docs/quotaRateLimit.typescript.md | 22 +- docs/rabbitmqSecretBackend.csharp.md | 32 +- docs/rabbitmqSecretBackend.go.md | 44 +- docs/rabbitmqSecretBackend.java.md | 60 +- docs/rabbitmqSecretBackend.python.md | 60 +- docs/rabbitmqSecretBackend.typescript.md | 32 +- docs/rabbitmqSecretBackendRole.csharp.md | 38 +- docs/rabbitmqSecretBackendRole.go.md | 68 +- docs/rabbitmqSecretBackendRole.java.md | 54 +- docs/rabbitmqSecretBackendRole.python.md | 54 +- docs/rabbitmqSecretBackendRole.typescript.md | 38 +- docs/raftAutopilot.csharp.md | 24 +- docs/raftAutopilot.go.md | 36 +- docs/raftAutopilot.java.md | 44 +- docs/raftAutopilot.python.md | 44 +- docs/raftAutopilot.typescript.md | 24 +- docs/raftSnapshotAgentConfig.csharp.md | 64 +- docs/raftSnapshotAgentConfig.go.md | 76 +- docs/raftSnapshotAgentConfig.java.md | 124 +- docs/raftSnapshotAgentConfig.python.md | 124 +- docs/raftSnapshotAgentConfig.typescript.md | 64 +- docs/rgpPolicy.csharp.md | 16 +- docs/rgpPolicy.go.md | 28 +- docs/rgpPolicy.java.md | 28 +- docs/rgpPolicy.python.md | 28 +- docs/rgpPolicy.typescript.md | 16 +- docs/samlAuthBackend.csharp.md | 30 +- docs/samlAuthBackend.go.md | 42 +- docs/samlAuthBackend.java.md | 56 +- docs/samlAuthBackend.python.md | 56 +- docs/samlAuthBackend.typescript.md | 30 +- docs/samlAuthBackendRole.csharp.md | 42 +- docs/samlAuthBackendRole.go.md | 54 +- docs/samlAuthBackendRole.java.md | 80 +- docs/samlAuthBackendRole.python.md | 80 +- docs/samlAuthBackendRole.typescript.md | 42 +- docs/secretsSyncAssociation.csharp.md | 18 +- docs/secretsSyncAssociation.go.md | 30 +- docs/secretsSyncAssociation.java.md | 32 +- docs/secretsSyncAssociation.python.md | 32 +- docs/secretsSyncAssociation.typescript.md | 18 +- docs/secretsSyncAwsDestination.csharp.md | 112 +- docs/secretsSyncAwsDestination.go.md | 124 +- docs/secretsSyncAwsDestination.java.md | 154 ++- docs/secretsSyncAwsDestination.python.md | 154 ++- docs/secretsSyncAwsDestination.typescript.md | 110 +- docs/secretsSyncAzureDestination.csharp.md | 26 +- docs/secretsSyncAzureDestination.go.md | 38 +- docs/secretsSyncAzureDestination.java.md | 48 +- docs/secretsSyncAzureDestination.python.md | 48 +- .../secretsSyncAzureDestination.typescript.md | 26 +- docs/secretsSyncConfig.csharp.md | 14 +- docs/secretsSyncConfig.go.md | 26 +- docs/secretsSyncConfig.java.md | 24 +- docs/secretsSyncConfig.python.md | 24 +- docs/secretsSyncConfig.typescript.md | 14 +- docs/secretsSyncGcpDestination.csharp.md | 63 +- docs/secretsSyncGcpDestination.go.md | 75 +- docs/secretsSyncGcpDestination.java.md | 89 +- docs/secretsSyncGcpDestination.python.md | 89 +- docs/secretsSyncGcpDestination.typescript.md | 62 +- docs/secretsSyncGhDestination.csharp.md | 112 +- docs/secretsSyncGhDestination.go.md | 124 +- docs/secretsSyncGhDestination.java.md | 154 ++- docs/secretsSyncGhDestination.python.md | 154 ++- docs/secretsSyncGhDestination.typescript.md | 110 +- docs/secretsSyncGithubApps.csharp.md | 984 ++++++++++++++ docs/secretsSyncGithubApps.go.md | 984 ++++++++++++++ docs/secretsSyncGithubApps.java.md | 1105 ++++++++++++++++ docs/secretsSyncGithubApps.python.md | 1145 ++++++++++++++++ docs/secretsSyncGithubApps.typescript.md | 971 ++++++++++++++ docs/secretsSyncVercelDestination.csharp.md | 22 +- docs/secretsSyncVercelDestination.go.md | 34 +- docs/secretsSyncVercelDestination.java.md | 40 +- docs/secretsSyncVercelDestination.python.md | 40 +- ...secretsSyncVercelDestination.typescript.md | 22 +- docs/sshSecretBackendCa.csharp.md | 18 +- docs/sshSecretBackendCa.go.md | 30 +- docs/sshSecretBackendCa.java.md | 32 +- docs/sshSecretBackendCa.python.md | 32 +- docs/sshSecretBackendCa.typescript.md | 18 +- docs/sshSecretBackendRole.csharp.md | 151 +-- docs/sshSecretBackendRole.go.md | 169 +-- docs/sshSecretBackendRole.java.md | 261 ++-- docs/sshSecretBackendRole.python.md | 261 ++-- docs/sshSecretBackendRole.typescript.md | 150 +-- docs/terraformCloudSecretBackend.csharp.md | 26 +- docs/terraformCloudSecretBackend.go.md | 38 +- docs/terraformCloudSecretBackend.java.md | 48 +- docs/terraformCloudSecretBackend.python.md | 48 +- .../terraformCloudSecretBackend.typescript.md | 26 +- docs/terraformCloudSecretCreds.csharp.md | 14 +- docs/terraformCloudSecretCreds.go.md | 26 +- docs/terraformCloudSecretCreds.java.md | 24 +- docs/terraformCloudSecretCreds.python.md | 24 +- docs/terraformCloudSecretCreds.typescript.md | 14 +- docs/terraformCloudSecretRole.csharp.md | 24 +- docs/terraformCloudSecretRole.go.md | 36 +- docs/terraformCloudSecretRole.java.md | 44 +- docs/terraformCloudSecretRole.python.md | 44 +- docs/terraformCloudSecretRole.typescript.md | 24 +- docs/token.csharp.md | 38 +- docs/token.go.md | 50 +- docs/token.java.md | 72 +- docs/token.python.md | 72 +- docs/token.typescript.md | 38 +- docs/tokenAuthBackendRole.csharp.md | 46 +- docs/tokenAuthBackendRole.go.md | 58 +- docs/tokenAuthBackendRole.java.md | 88 +- docs/tokenAuthBackendRole.python.md | 88 +- docs/tokenAuthBackendRole.typescript.md | 46 +- docs/transformAlphabet.csharp.md | 16 +- docs/transformAlphabet.go.md | 28 +- docs/transformAlphabet.java.md | 28 +- docs/transformAlphabet.python.md | 28 +- docs/transformAlphabet.typescript.md | 16 +- docs/transformRole.csharp.md | 16 +- docs/transformRole.go.md | 28 +- docs/transformRole.java.md | 28 +- docs/transformRole.python.md | 28 +- docs/transformRole.typescript.md | 16 +- docs/transformTemplate.csharp.md | 24 +- docs/transformTemplate.go.md | 36 +- docs/transformTemplate.java.md | 44 +- docs/transformTemplate.python.md | 44 +- docs/transformTemplate.typescript.md | 24 +- docs/transformTransformation.csharp.md | 28 +- docs/transformTransformation.go.md | 40 +- docs/transformTransformation.java.md | 52 +- docs/transformTransformation.python.md | 52 +- docs/transformTransformation.typescript.md | 28 +- docs/transitSecretBackendKey.csharp.md | 81 +- docs/transitSecretBackendKey.go.md | 93 +- docs/transitSecretBackendKey.java.md | 125 +- docs/transitSecretBackendKey.python.md | 125 +- docs/transitSecretBackendKey.typescript.md | 80 +- docs/transitSecretCacheConfig.csharp.md | 14 +- docs/transitSecretCacheConfig.go.md | 26 +- docs/transitSecretCacheConfig.java.md | 24 +- docs/transitSecretCacheConfig.python.md | 24 +- docs/transitSecretCacheConfig.typescript.md | 14 +- package.json | 2 +- scripts/check-for-upgrades.js | 2 +- src/ad-secret-backend/README.md | 2 +- src/ad-secret-backend/index.ts | 142 +- src/ad-secret-library/README.md | 2 +- src/ad-secret-library/index.ts | 28 +- src/ad-secret-role/README.md | 2 +- src/ad-secret-role/index.ts | 24 +- src/alicloud-auth-backend-role/README.md | 2 +- src/alicloud-auth-backend-role/index.ts | 40 +- src/approle-auth-backend-login/README.md | 2 +- src/approle-auth-backend-login/index.ts | 22 +- .../README.md | 2 +- .../index.ts | 30 +- src/approle-auth-backend-role/README.md | 2 +- src/approle-auth-backend-role/index.ts | 48 +- src/audit-request-header/README.md | 2 +- src/audit-request-header/index.ts | 20 +- src/audit/README.md | 2 +- src/audit/index.ts | 26 +- src/auth-backend/README.md | 2 +- src/auth-backend/index.ts | 44 +- src/aws-auth-backend-cert/README.md | 2 +- src/aws-auth-backend-cert/index.ts | 24 +- src/aws-auth-backend-client/README.md | 2 +- src/aws-auth-backend-client/index.ts | 34 +- .../README.md | 2 +- src/aws-auth-backend-config-identity/index.ts | 26 +- .../README.md | 2 +- .../index.ts | 22 +- src/aws-auth-backend-login/README.md | 2 +- src/aws-auth-backend-login/index.ts | 36 +- src/aws-auth-backend-role-tag/README.md | 2 +- src/aws-auth-backend-role-tag/index.ts | 30 +- src/aws-auth-backend-role/README.md | 2 +- src/aws-auth-backend-role/index.ts | 70 +- .../README.md | 2 +- .../index.ts | 22 +- src/aws-auth-backend-sts-role/README.md | 2 +- src/aws-auth-backend-sts-role/index.ts | 22 +- src/aws-secret-backend-role/README.md | 2 +- src/aws-secret-backend-role/index.ts | 38 +- src/aws-secret-backend-static-role/README.md | 2 +- src/aws-secret-backend-static-role/index.ts | 24 +- src/aws-secret-backend/README.md | 2 +- src/aws-secret-backend/index.ts | 48 +- src/azure-auth-backend-config/README.md | 2 +- src/azure-auth-backend-config/index.ts | 28 +- src/azure-auth-backend-role/README.md | 2 +- src/azure-auth-backend-role/index.ts | 50 +- src/azure-secret-backend-role/README.md | 2 +- src/azure-secret-backend-role/index.ts | 46 +- src/azure-secret-backend/README.md | 2 +- src/azure-secret-backend/index.ts | 34 +- src/cert-auth-backend-role/README.md | 2 +- src/cert-auth-backend-role/index.ts | 94 +- src/consul-secret-backend-role/README.md | 2 +- src/consul-secret-backend-role/index.ts | 70 +- src/consul-secret-backend/README.md | 2 +- src/consul-secret-backend/index.ts | 42 +- .../README.md | 2 +- src/data-vault-ad-access-credentials/index.ts | 20 +- .../README.md | 2 +- .../index.ts | 20 +- src/data-vault-auth-backend/README.md | 2 +- src/data-vault-auth-backend/index.ts | 18 +- src/data-vault-auth-backends/README.md | 2 +- src/data-vault-auth-backends/index.ts | 18 +- .../README.md | 2 +- .../index.ts | 28 +- .../README.md | 2 +- .../index.ts | 20 +- .../README.md | 2 +- .../index.ts | 34 +- .../README.md | 2 +- src/data-vault-gcp-auth-backend-role/index.ts | 38 +- src/data-vault-generic-secret/README.md | 2 +- src/data-vault-generic-secret/index.ts | 22 +- src/data-vault-identity-entity/README.md | 2 +- src/data-vault-identity-entity/index.ts | 26 +- src/data-vault-identity-group/README.md | 2 +- src/data-vault-identity-group/index.ts | 26 +- .../README.md | 2 +- .../index.ts | 18 +- .../README.md | 2 +- .../index.ts | 18 +- .../README.md | 2 +- .../index.ts | 18 +- .../README.md | 2 +- .../index.ts | 30 +- .../README.md | 2 +- .../index.ts | 40 +- .../README.md | 2 +- .../index.ts | 26 +- src/data-vault-kv-secret-subkeys-v2/README.md | 2 +- src/data-vault-kv-secret-subkeys-v2/index.ts | 24 +- src/data-vault-kv-secret-v2/README.md | 2 +- src/data-vault-kv-secret-v2/index.ts | 22 +- src/data-vault-kv-secret/README.md | 2 +- src/data-vault-kv-secret/index.ts | 18 +- src/data-vault-kv-secrets-list-v2/README.md | 2 +- src/data-vault-kv-secrets-list-v2/index.ts | 20 +- src/data-vault-kv-secrets-list/README.md | 2 +- src/data-vault-kv-secrets-list/index.ts | 18 +- .../README.md | 2 +- .../index.ts | 20 +- .../README.md | 2 +- .../index.ts | 20 +- src/data-vault-nomad-access-token/README.md | 2 +- src/data-vault-nomad-access-token/index.ts | 20 +- .../README.md | 2 +- .../index.ts | 20 +- .../README.md | 2 +- .../index.ts | 18 +- .../README.md | 2 +- .../index.ts | 20 +- .../README.md | 2 +- .../index.ts | 18 +- src/data-vault-policy-document/README.md | 2 +- src/data-vault-policy-document/index.ts | 42 +- src/data-vault-raft-autopilot-state/README.md | 2 +- src/data-vault-raft-autopilot-state/index.ts | 16 +- src/data-vault-transform-decode/README.md | 2 +- src/data-vault-transform-decode/index.ts | 32 +- src/data-vault-transform-encode/README.md | 2 +- src/data-vault-transform-encode/index.ts | 32 +- src/data-vault-transit-decrypt/README.md | 2 +- src/data-vault-transit-decrypt/index.ts | 24 +- src/data-vault-transit-encrypt/README.md | 2 +- src/data-vault-transit-encrypt/index.ts | 26 +- .../README.md | 2 +- .../index.ts | 372 +++--- src/database-secret-backend-role/README.md | 2 +- src/database-secret-backend-role/index.ts | 38 +- .../README.md | 2 +- .../index.ts | 32 +- src/database-secrets-mount/README.md | 2 +- src/database-secrets-mount/index.ts | 596 ++++----- src/egp-policy/README.md | 2 +- src/egp-policy/index.ts | 24 +- src/gcp-auth-backend-role/README.md | 2 +- src/gcp-auth-backend-role/index.ts | 58 +- src/gcp-auth-backend/README.md | 2 +- src/gcp-auth-backend/index.ts | 62 +- src/gcp-secret-backend/README.md | 2 +- src/gcp-secret-backend/index.ts | 30 +- src/gcp-secret-impersonated-account/README.md | 2 +- src/gcp-secret-impersonated-account/index.ts | 24 +- src/gcp-secret-roleset/README.md | 2 +- src/gcp-secret-roleset/index.ts | 32 +- src/gcp-secret-static-account/README.md | 2 +- src/gcp-secret-static-account/index.ts | 32 +- src/generic-endpoint/README.md | 2 +- src/generic-endpoint/index.ts | 28 +- src/generic-secret/README.md | 2 +- src/generic-secret/index.ts | 24 +- src/github-auth-backend/README.md | 2 +- src/github-auth-backend/index.ts | 64 +- src/github-team/README.md | 2 +- src/github-team/index.ts | 22 +- src/github-user/README.md | 2 +- src/github-user/index.ts | 22 +- src/identity-entity-alias/README.md | 2 +- src/identity-entity-alias/index.ts | 24 +- src/identity-entity-policies/README.md | 2 +- src/identity-entity-policies/index.ts | 22 +- src/identity-entity/README.md | 2 +- src/identity-entity/index.ts | 26 +- src/identity-group-alias/README.md | 2 +- src/identity-group-alias/index.ts | 22 +- .../README.md | 2 +- src/identity-group-member-entity-ids/index.ts | 27 +- src/identity-group-member-group-ids/README.md | 2 +- src/identity-group-member-group-ids/index.ts | 22 +- src/identity-group-policies/README.md | 2 +- src/identity-group-policies/index.ts | 22 +- src/identity-group/README.md | 2 +- src/identity-group/index.ts | 34 +- src/identity-mfa-duo/README.md | 2 +- src/identity-mfa-duo/index.ts | 28 +- src/identity-mfa-login-enforcement/README.md | 2 +- src/identity-mfa-login-enforcement/index.ts | 28 +- src/identity-mfa-okta/README.md | 2 +- src/identity-mfa-okta/index.ts | 26 +- src/identity-mfa-pingid/README.md | 2 +- src/identity-mfa-pingid/index.ts | 20 +- src/identity-mfa-totp/README.md | 2 +- src/identity-mfa-totp/index.ts | 32 +- src/identity-oidc-assignment/README.md | 2 +- src/identity-oidc-assignment/index.ts | 22 +- src/identity-oidc-client/README.md | 2 +- src/identity-oidc-client/index.ts | 30 +- .../README.md | 2 +- .../index.ts | 20 +- src/identity-oidc-key/README.md | 2 +- src/identity-oidc-key/index.ts | 26 +- src/identity-oidc-provider/README.md | 2 +- src/identity-oidc-provider/index.ts | 26 +- src/identity-oidc-role/README.md | 2 +- src/identity-oidc-role/index.ts | 26 +- src/identity-oidc-scope/README.md | 2 +- src/identity-oidc-scope/index.ts | 22 +- src/identity-oidc/README.md | 2 +- src/identity-oidc/index.ts | 18 +- src/index.ts | 2 + src/jwt-auth-backend-role/README.md | 2 +- src/jwt-auth-backend-role/index.ts | 72 +- src/jwt-auth-backend/README.md | 2 +- src/jwt-auth-backend/index.ts | 72 +- src/kmip-secret-backend/README.md | 2 +- src/kmip-secret-backend/index.ts | 40 +- src/kmip-secret-role/README.md | 2 +- src/kmip-secret-role/index.ts | 56 +- src/kmip-secret-scope/README.md | 2 +- src/kmip-secret-scope/index.ts | 22 +- src/kubernetes-auth-backend-config/README.md | 2 +- src/kubernetes-auth-backend-config/index.ts | 32 +- src/kubernetes-auth-backend-role/README.md | 2 +- src/kubernetes-auth-backend-role/index.ts | 46 +- src/kubernetes-secret-backend-role/README.md | 2 +- src/kubernetes-secret-backend-role/index.ts | 40 +- src/kubernetes-secret-backend/README.md | 2 +- src/kubernetes-secret-backend/index.ts | 46 +- src/kv-secret-backend-v2/README.md | 2 +- src/kv-secret-backend-v2/index.ts | 24 +- src/kv-secret-v2/README.md | 2 +- src/kv-secret-v2/index.ts | 40 +- src/kv-secret/README.md | 2 +- src/kv-secret/index.ts | 20 +- src/lazy-index.ts | 2 + src/ldap-auth-backend-group/README.md | 2 +- src/ldap-auth-backend-group/index.ts | 22 +- src/ldap-auth-backend-user/README.md | 2 +- src/ldap-auth-backend-user/index.ts | 24 +- src/ldap-auth-backend/README.md | 2 +- src/ldap-auth-backend/index.ts | 88 +- .../README.md | 2 +- src/ldap-secret-backend-dynamic-role/index.ts | 32 +- src/ldap-secret-backend-library-set/README.md | 2 +- src/ldap-secret-backend-library-set/index.ts | 28 +- src/ldap-secret-backend-static-role/README.md | 2 +- src/ldap-secret-backend-static-role/index.ts | 56 +- src/ldap-secret-backend/README.md | 2 +- src/ldap-secret-backend/index.ts | 130 +- src/managed-keys/README.md | 2 +- src/managed-keys/index.ts | 106 +- src/mfa-duo/README.md | 2 +- src/mfa-duo/index.ts | 30 +- src/mfa-okta/README.md | 2 +- src/mfa-okta/index.ts | 30 +- src/mfa-pingid/README.md | 2 +- src/mfa-pingid/index.ts | 24 +- src/mfa-totp/README.md | 2 +- src/mfa-totp/index.ts | 32 +- src/mongodbatlas-secret-backend/README.md | 2 +- src/mongodbatlas-secret-backend/index.ts | 22 +- src/mongodbatlas-secret-role/README.md | 2 +- src/mongodbatlas-secret-role/index.ts | 36 +- src/mount/README.md | 2 +- src/mount/index.ts | 40 +- src/namespace/README.md | 2 +- src/namespace/index.ts | 22 +- src/nomad-secret-backend/README.md | 2 +- src/nomad-secret-backend/index.ts | 44 +- src/nomad-secret-role/README.md | 2 +- src/nomad-secret-role/index.ts | 26 +- src/okta-auth-backend-group/README.md | 2 +- src/okta-auth-backend-group/index.ts | 22 +- src/okta-auth-backend-user/README.md | 2 +- src/okta-auth-backend-user/index.ts | 24 +- src/okta-auth-backend/README.md | 2 +- src/okta-auth-backend/index.ts | 48 +- src/password-policy/README.md | 2 +- src/password-policy/index.ts | 20 +- src/pki-secret-backend-cert/README.md | 2 +- src/pki-secret-backend-cert/index.ts | 48 +- src/pki-secret-backend-config-ca/README.md | 2 +- src/pki-secret-backend-config-ca/index.ts | 20 +- .../README.md | 3 + .../index.ts | 238 ++++ .../README.md | 2 +- .../index.ts | 22 +- src/pki-secret-backend-config-urls/README.md | 2 +- src/pki-secret-backend-config-urls/index.ts | 54 +- src/pki-secret-backend-crl-config/README.md | 2 +- src/pki-secret-backend-crl-config/index.ts | 40 +- .../README.md | 2 +- .../index.ts | 64 +- .../README.md | 2 +- .../index.ts | 20 +- src/pki-secret-backend-issuer/README.md | 2 +- src/pki-secret-backend-issuer/index.ts | 38 +- src/pki-secret-backend-key/README.md | 2 +- src/pki-secret-backend-key/index.ts | 30 +- src/pki-secret-backend-role/README.md | 2 +- src/pki-secret-backend-role/index.ts | 112 +- src/pki-secret-backend-root-cert/README.md | 2 +- src/pki-secret-backend-root-cert/index.ts | 75 +- .../README.md | 2 +- .../index.ts | 65 +- src/pki-secret-backend-sign/README.md | 2 +- src/pki-secret-backend-sign/index.ts | 49 +- src/policy/README.md | 2 +- src/policy/index.ts | 20 +- src/provider/README.md | 2 +- src/provider/index.ts | 256 ++-- src/quota-lease-count/README.md | 2 +- src/quota-lease-count/index.ts | 24 +- src/quota-rate-limit/README.md | 2 +- src/quota-rate-limit/index.ts | 28 +- src/rabbitmq-secret-backend-role/README.md | 2 +- src/rabbitmq-secret-backend-role/index.ts | 44 +- src/rabbitmq-secret-backend/README.md | 2 +- src/rabbitmq-secret-backend/index.ts | 38 +- src/raft-autopilot/README.md | 2 +- src/raft-autopilot/index.ts | 30 +- src/raft-snapshot-agent-config/README.md | 2 +- src/raft-snapshot-agent-config/index.ts | 70 +- src/rgp-policy/README.md | 2 +- src/rgp-policy/index.ts | 22 +- src/saml-auth-backend-role/README.md | 2 +- src/saml-auth-backend-role/index.ts | 48 +- src/saml-auth-backend/README.md | 2 +- src/saml-auth-backend/index.ts | 36 +- src/secrets-sync-association/README.md | 2 +- src/secrets-sync-association/index.ts | 24 +- src/secrets-sync-aws-destination/README.md | 2 +- src/secrets-sync-aws-destination/index.ts | 88 +- src/secrets-sync-azure-destination/README.md | 2 +- src/secrets-sync-azure-destination/index.ts | 32 +- src/secrets-sync-config/README.md | 2 +- src/secrets-sync-config/index.ts | 20 +- src/secrets-sync-gcp-destination/README.md | 2 +- src/secrets-sync-gcp-destination/index.ts | 54 +- src/secrets-sync-gh-destination/README.md | 2 +- src/secrets-sync-gh-destination/index.ts | 86 +- src/secrets-sync-github-apps/README.md | 3 + src/secrets-sync-github-apps/index.ts | 237 ++++ src/secrets-sync-vercel-destination/README.md | 2 +- src/secrets-sync-vercel-destination/index.ts | 28 +- src/ssh-secret-backend-ca/README.md | 2 +- src/ssh-secret-backend-ca/index.ts | 24 +- src/ssh-secret-backend-role/README.md | 2 +- src/ssh-secret-backend-role/index.ts | 98 +- src/terraform-cloud-secret-backend/README.md | 2 +- src/terraform-cloud-secret-backend/index.ts | 32 +- src/terraform-cloud-secret-creds/README.md | 2 +- src/terraform-cloud-secret-creds/index.ts | 20 +- src/terraform-cloud-secret-role/README.md | 2 +- src/terraform-cloud-secret-role/index.ts | 30 +- src/token-auth-backend-role/README.md | 2 +- src/token-auth-backend-role/index.ts | 52 +- src/token/README.md | 2 +- src/token/index.ts | 44 +- src/transform-alphabet/README.md | 2 +- src/transform-alphabet/index.ts | 22 +- src/transform-role/README.md | 2 +- src/transform-role/index.ts | 22 +- src/transform-template/README.md | 2 +- src/transform-template/index.ts | 30 +- src/transform-transformation/README.md | 2 +- src/transform-transformation/index.ts | 34 +- src/transit-secret-backend-key/README.md | 2 +- src/transit-secret-backend-key/index.ts | 70 +- src/transit-secret-cache-config/README.md | 2 +- src/transit-secret-cache-config/index.ts | 20 +- src/version.json | 2 +- yarn.lock | 31 +- 1281 files changed, 38033 insertions(+), 27094 deletions(-) create mode 100644 docs/pkiSecretBackendConfigCluster.csharp.md create mode 100644 docs/pkiSecretBackendConfigCluster.go.md create mode 100644 docs/pkiSecretBackendConfigCluster.java.md create mode 100644 docs/pkiSecretBackendConfigCluster.python.md create mode 100644 docs/pkiSecretBackendConfigCluster.typescript.md create mode 100644 docs/secretsSyncGithubApps.csharp.md create mode 100644 docs/secretsSyncGithubApps.go.md create mode 100644 docs/secretsSyncGithubApps.java.md create mode 100644 docs/secretsSyncGithubApps.python.md create mode 100644 docs/secretsSyncGithubApps.typescript.md create mode 100644 src/pki-secret-backend-config-cluster/README.md create mode 100644 src/pki-secret-backend-config-cluster/index.ts create mode 100644 src/secrets-sync-github-apps/README.md create mode 100644 src/secrets-sync-github-apps/index.ts diff --git a/.projenrc.js b/.projenrc.js index 76c530c1..803deaa5 100644 --- a/.projenrc.js +++ b/.projenrc.js @@ -6,7 +6,7 @@ const { CdktfProviderProject } = require("@cdktf/provider-project"); const project = new CdktfProviderProject({ useCustomGithubRunner: false, - terraformProvider: "hashicorp/vault@~> 3.7", + terraformProvider: "hashicorp/vault@~> 4.0", cdktfVersion: "^0.20.0", constructsVersion: "^10.3.0", minNodeVersion: "18.12.0", diff --git a/README.md b/README.md index 016a4767..a4bccc40 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ -# CDKTF prebuilt bindings for hashicorp/vault provider version 3.25.0 +# CDKTF prebuilt bindings for hashicorp/vault provider version 4.0.0 -This repo builds and publishes the [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs) bindings for [CDK for Terraform](https://cdk.tf). +This repo builds and publishes the [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs) bindings for [CDK for Terraform](https://cdk.tf). ## Available Packages @@ -58,12 +58,12 @@ You can also visit a hosted version of the documentation on [constructs.dev](htt ## Versioning -This project is explicitly not tracking the Terraform vault provider version 1:1. In fact, it always tracks `latest` of `~> 3.7` with every release. If there are scenarios where you explicitly have to pin your provider version, you can do so by [generating the provider constructs manually](https://cdk.tf/imports). +This project is explicitly not tracking the Terraform vault provider version 1:1. In fact, it always tracks `latest` of `~> 4.0` with every release. If there are scenarios where you explicitly have to pin your provider version, you can do so by [generating the provider constructs manually](https://cdk.tf/imports). These are the upstream dependencies: - [CDK for Terraform](https://cdk.tf) -- [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/3.25.0) +- [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.0.0) - [Terraform Engine](https://terraform.io) If there are breaking changes (backward incompatible) in any of the above, the major version of this project will be bumped. diff --git a/cdktf.json b/cdktf.json index 2eef966d..dbef0f71 100644 --- a/cdktf.json +++ b/cdktf.json @@ -3,7 +3,7 @@ "app": "echo noop", "sendCrashReports": false, "terraformProviders": [ - "hashicorp/vault@~> 3.7" + "hashicorp/vault@~> 4.0" ], "//": "~~ Generated by projen. To modify, edit .projenrc.js and run \"npx projen\"." } diff --git a/docs/API.csharp.md b/docs/API.csharp.md index ce7bed3b..8a06e179 100644 --- a/docs/API.csharp.md +++ b/docs/API.csharp.md @@ -141,6 +141,7 @@ The following submodules are available: - [passwordPolicy](./passwordPolicy.csharp.md) - [pkiSecretBackendCert](./pkiSecretBackendCert.csharp.md) - [pkiSecretBackendConfigCa](./pkiSecretBackendConfigCa.csharp.md) +- [pkiSecretBackendConfigCluster](./pkiSecretBackendConfigCluster.csharp.md) - [pkiSecretBackendConfigIssuers](./pkiSecretBackendConfigIssuers.csharp.md) - [pkiSecretBackendConfigUrls](./pkiSecretBackendConfigUrls.csharp.md) - [pkiSecretBackendCrlConfig](./pkiSecretBackendCrlConfig.csharp.md) @@ -169,6 +170,7 @@ The following submodules are available: - [secretsSyncConfig](./secretsSyncConfig.csharp.md) - [secretsSyncGcpDestination](./secretsSyncGcpDestination.csharp.md) - [secretsSyncGhDestination](./secretsSyncGhDestination.csharp.md) +- [secretsSyncGithubApps](./secretsSyncGithubApps.csharp.md) - [secretsSyncVercelDestination](./secretsSyncVercelDestination.csharp.md) - [sshSecretBackendCa](./sshSecretBackendCa.csharp.md) - [sshSecretBackendRole](./sshSecretBackendRole.csharp.md) diff --git a/docs/API.go.md b/docs/API.go.md index 1a415e9b..82068de8 100644 --- a/docs/API.go.md +++ b/docs/API.go.md @@ -141,6 +141,7 @@ The following submodules are available: - [passwordPolicy](./passwordPolicy.go.md) - [pkiSecretBackendCert](./pkiSecretBackendCert.go.md) - [pkiSecretBackendConfigCa](./pkiSecretBackendConfigCa.go.md) +- [pkiSecretBackendConfigCluster](./pkiSecretBackendConfigCluster.go.md) - [pkiSecretBackendConfigIssuers](./pkiSecretBackendConfigIssuers.go.md) - [pkiSecretBackendConfigUrls](./pkiSecretBackendConfigUrls.go.md) - [pkiSecretBackendCrlConfig](./pkiSecretBackendCrlConfig.go.md) @@ -169,6 +170,7 @@ The following submodules are available: - [secretsSyncConfig](./secretsSyncConfig.go.md) - [secretsSyncGcpDestination](./secretsSyncGcpDestination.go.md) - [secretsSyncGhDestination](./secretsSyncGhDestination.go.md) +- [secretsSyncGithubApps](./secretsSyncGithubApps.go.md) - [secretsSyncVercelDestination](./secretsSyncVercelDestination.go.md) - [sshSecretBackendCa](./sshSecretBackendCa.go.md) - [sshSecretBackendRole](./sshSecretBackendRole.go.md) diff --git a/docs/API.java.md b/docs/API.java.md index ed1e3775..db608e6b 100644 --- a/docs/API.java.md +++ b/docs/API.java.md @@ -141,6 +141,7 @@ The following submodules are available: - [passwordPolicy](./passwordPolicy.java.md) - [pkiSecretBackendCert](./pkiSecretBackendCert.java.md) - [pkiSecretBackendConfigCa](./pkiSecretBackendConfigCa.java.md) +- [pkiSecretBackendConfigCluster](./pkiSecretBackendConfigCluster.java.md) - [pkiSecretBackendConfigIssuers](./pkiSecretBackendConfigIssuers.java.md) - [pkiSecretBackendConfigUrls](./pkiSecretBackendConfigUrls.java.md) - [pkiSecretBackendCrlConfig](./pkiSecretBackendCrlConfig.java.md) @@ -169,6 +170,7 @@ The following submodules are available: - [secretsSyncConfig](./secretsSyncConfig.java.md) - [secretsSyncGcpDestination](./secretsSyncGcpDestination.java.md) - [secretsSyncGhDestination](./secretsSyncGhDestination.java.md) +- [secretsSyncGithubApps](./secretsSyncGithubApps.java.md) - [secretsSyncVercelDestination](./secretsSyncVercelDestination.java.md) - [sshSecretBackendCa](./sshSecretBackendCa.java.md) - [sshSecretBackendRole](./sshSecretBackendRole.java.md) diff --git a/docs/API.python.md b/docs/API.python.md index 8dea475f..e914c304 100644 --- a/docs/API.python.md +++ b/docs/API.python.md @@ -141,6 +141,7 @@ The following submodules are available: - [passwordPolicy](./passwordPolicy.python.md) - [pkiSecretBackendCert](./pkiSecretBackendCert.python.md) - [pkiSecretBackendConfigCa](./pkiSecretBackendConfigCa.python.md) +- [pkiSecretBackendConfigCluster](./pkiSecretBackendConfigCluster.python.md) - [pkiSecretBackendConfigIssuers](./pkiSecretBackendConfigIssuers.python.md) - [pkiSecretBackendConfigUrls](./pkiSecretBackendConfigUrls.python.md) - [pkiSecretBackendCrlConfig](./pkiSecretBackendCrlConfig.python.md) @@ -169,6 +170,7 @@ The following submodules are available: - [secretsSyncConfig](./secretsSyncConfig.python.md) - [secretsSyncGcpDestination](./secretsSyncGcpDestination.python.md) - [secretsSyncGhDestination](./secretsSyncGhDestination.python.md) +- [secretsSyncGithubApps](./secretsSyncGithubApps.python.md) - [secretsSyncVercelDestination](./secretsSyncVercelDestination.python.md) - [sshSecretBackendCa](./sshSecretBackendCa.python.md) - [sshSecretBackendRole](./sshSecretBackendRole.python.md) diff --git a/docs/API.typescript.md b/docs/API.typescript.md index 8e188b04..da2e8661 100644 --- a/docs/API.typescript.md +++ b/docs/API.typescript.md @@ -141,6 +141,7 @@ The following submodules are available: - [passwordPolicy](./passwordPolicy.typescript.md) - [pkiSecretBackendCert](./pkiSecretBackendCert.typescript.md) - [pkiSecretBackendConfigCa](./pkiSecretBackendConfigCa.typescript.md) +- [pkiSecretBackendConfigCluster](./pkiSecretBackendConfigCluster.typescript.md) - [pkiSecretBackendConfigIssuers](./pkiSecretBackendConfigIssuers.typescript.md) - [pkiSecretBackendConfigUrls](./pkiSecretBackendConfigUrls.typescript.md) - [pkiSecretBackendCrlConfig](./pkiSecretBackendCrlConfig.typescript.md) @@ -169,6 +170,7 @@ The following submodules are available: - [secretsSyncConfig](./secretsSyncConfig.typescript.md) - [secretsSyncGcpDestination](./secretsSyncGcpDestination.typescript.md) - [secretsSyncGhDestination](./secretsSyncGhDestination.typescript.md) +- [secretsSyncGithubApps](./secretsSyncGithubApps.typescript.md) - [secretsSyncVercelDestination](./secretsSyncVercelDestination.typescript.md) - [sshSecretBackendCa](./sshSecretBackendCa.typescript.md) - [sshSecretBackendRole](./sshSecretBackendRole.typescript.md) diff --git a/docs/adSecretBackend.csharp.md b/docs/adSecretBackend.csharp.md index d4c0c4a7..1e07a971 100644 --- a/docs/adSecretBackend.csharp.md +++ b/docs/adSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers @@ -84,14 +84,12 @@ Must be unique amongst siblings in the same scope | ResetDescription | *No description.* | | ResetDisableRemount | *No description.* | | ResetDiscoverdn | *No description.* | -| ResetFormatter | *No description.* | | ResetGroupattr | *No description.* | | ResetGroupdn | *No description.* | | ResetGroupfilter | *No description.* | | ResetId | *No description.* | | ResetInsecureTls | *No description.* | | ResetLastRotationTolerance | *No description.* | -| ResetLength | *No description.* | | ResetLocal | *No description.* | | ResetMaxLeaseTtlSeconds | *No description.* | | ResetMaxTtl | *No description.* | @@ -465,12 +463,6 @@ private void ResetDisableRemount() private void ResetDiscoverdn() ``` -##### `ResetFormatter` - -```csharp -private void ResetFormatter() -``` - ##### `ResetGroupattr` ```csharp @@ -507,12 +499,6 @@ private void ResetInsecureTls() private void ResetLastRotationTolerance() ``` -##### `ResetLength` - -```csharp -private void ResetLength() -``` - ##### `ResetLocal` ```csharp @@ -712,7 +698,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -755,14 +741,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | DescriptionInput | string | *No description.* | | DisableRemountInput | object | *No description.* | | DiscoverdnInput | object | *No description.* | -| FormatterInput | string | *No description.* | | GroupattrInput | string | *No description.* | | GroupdnInput | string | *No description.* | | GroupfilterInput | string | *No description.* | | IdInput | string | *No description.* | | InsecureTlsInput | object | *No description.* | | LastRotationToleranceInput | double | *No description.* | -| LengthInput | double | *No description.* | | LocalInput | object | *No description.* | | MaxLeaseTtlSecondsInput | double | *No description.* | | MaxTtlInput | double | *No description.* | @@ -792,14 +776,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Description | string | *No description.* | | DisableRemount | object | *No description.* | | Discoverdn | object | *No description.* | -| Formatter | string | *No description.* | | Groupattr | string | *No description.* | | Groupdn | string | *No description.* | | Groupfilter | string | *No description.* | | Id | string | *No description.* | | InsecureTls | object | *No description.* | | LastRotationTolerance | double | *No description.* | -| Length | double | *No description.* | | Local | object | *No description.* | | MaxLeaseTtlSeconds | double | *No description.* | | MaxTtl | double | *No description.* | @@ -1091,16 +1073,6 @@ public object DiscoverdnInput { get; } --- -##### `FormatterInput`Optional - -```csharp -public string FormatterInput { get; } -``` - -- *Type:* string - ---- - ##### `GroupattrInput`Optional ```csharp @@ -1161,16 +1133,6 @@ public double LastRotationToleranceInput { get; } --- -##### `LengthInput`Optional - -```csharp -public double LengthInput { get; } -``` - -- *Type:* double - ---- - ##### `LocalInput`Optional ```csharp @@ -1461,16 +1423,6 @@ public object Discoverdn { get; } --- -##### `Formatter`Required - -```csharp -public string Formatter { get; } -``` - -- *Type:* string - ---- - ##### `Groupattr`Required ```csharp @@ -1531,16 +1483,6 @@ public double LastRotationTolerance { get; } --- -##### `Length`Required - -```csharp -public double Length { get; } -``` - -- *Type:* double - ---- - ##### `Local`Required ```csharp @@ -1749,14 +1691,12 @@ new AdSecretBackendConfig { string Description = null, object DisableRemount = null, object Discoverdn = null, - string Formatter = null, string Groupattr = null, string Groupdn = null, string Groupfilter = null, string Id = null, object InsecureTls = null, double LastRotationTolerance = null, - double Length = null, object Local = null, double MaxLeaseTtlSeconds = null, double MaxTtl = null, @@ -1800,14 +1740,12 @@ new AdSecretBackendConfig { | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | | Discoverdn | object | Use anonymous bind to discover the bind DN of a user. | -| Formatter | string | Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". | | Groupattr | string | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | Groupdn | string | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | Groupfilter | string | Go template for querying group membership of user. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | InsecureTls | object | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | LastRotationTolerance | double | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | -| Length | double | The desired length of passwords that Vault generates. | | Local | object | Mark the secrets engine as local-only. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for secrets in seconds. | | MaxTtl | double | In seconds, the maximum password time-to-live. | @@ -1907,7 +1845,7 @@ public string Binddn { get; set; } Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -1921,7 +1859,7 @@ public string Bindpass { get; set; } LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -1935,7 +1873,7 @@ public object AnonymousGroupSearch { get; set; } Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -1949,7 +1887,7 @@ public string Backend { get; set; } The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -1963,7 +1901,7 @@ public object CaseSensitiveNames { get; set; } If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -1977,7 +1915,7 @@ public string Certificate { get; set; } CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -1991,7 +1929,7 @@ public string ClientTlsCert { get; set; } Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -2005,7 +1943,7 @@ public string ClientTlsKey { get; set; } Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -2019,7 +1957,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -2033,7 +1971,7 @@ public object DenyNullBind { get; set; } Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -2047,7 +1985,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -2061,7 +1999,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -2075,21 +2013,7 @@ public object Discoverdn { get; set; } Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} - ---- - -##### `Formatter`Optional - -```csharp -public string Formatter { get; set; } -``` - -- *Type:* string - -Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#formatter AdSecretBackend#formatter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -2105,7 +2029,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2119,7 +2043,7 @@ public string Groupdn { get; set; } LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2135,7 +2059,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2147,7 +2071,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2164,7 +2088,7 @@ public object InsecureTls { get; set; } Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2178,21 +2102,7 @@ public double LastRotationTolerance { get; set; } The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} - ---- - -##### `Length`Optional - -```csharp -public double Length { get; set; } -``` - -- *Type:* double - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#length AdSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2208,7 +2118,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2222,7 +2132,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2236,7 +2146,7 @@ public double MaxTtl { get; set; } In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2250,7 +2160,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2264,7 +2174,7 @@ public string PasswordPolicy { get; set; } Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2278,7 +2188,7 @@ public double RequestTimeout { get; set; } Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2292,7 +2202,7 @@ public object Starttls { get; set; } Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2306,7 +2216,7 @@ public string TlsMaxVersion { get; set; } Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2320,7 +2230,7 @@ public string TlsMinVersion { get; set; } Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2334,7 +2244,7 @@ public double Ttl { get; set; } In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2348,7 +2258,7 @@ public string Upndomain { get; set; } Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2362,7 +2272,7 @@ public string Url { get; set; } LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2376,7 +2286,7 @@ public object UsePre111GroupCnBehavior { get; set; } In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2390,7 +2300,7 @@ public string Userattr { get; set; } Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2404,7 +2314,7 @@ public string Userdn { get; set; } LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2420,7 +2330,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretBackend.go.md b/docs/adSecretBackend.go.md index bf81d38f..0ecd7325 100644 --- a/docs/adSecretBackend.go.md +++ b/docs/adSecretBackend.go.md @@ -4,12 +4,12 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretbackend" adsecretbackend.NewAdSecretBackend(scope Construct, id *string, config AdSecretBackendConfig) AdSecretBackend ``` @@ -84,14 +84,12 @@ Must be unique amongst siblings in the same scope | ResetDescription | *No description.* | | ResetDisableRemount | *No description.* | | ResetDiscoverdn | *No description.* | -| ResetFormatter | *No description.* | | ResetGroupattr | *No description.* | | ResetGroupdn | *No description.* | | ResetGroupfilter | *No description.* | | ResetId | *No description.* | | ResetInsecureTls | *No description.* | | ResetLastRotationTolerance | *No description.* | -| ResetLength | *No description.* | | ResetLocal | *No description.* | | ResetMaxLeaseTtlSeconds | *No description.* | | ResetMaxTtl | *No description.* | @@ -465,12 +463,6 @@ func ResetDisableRemount() func ResetDiscoverdn() ``` -##### `ResetFormatter` - -```go -func ResetFormatter() -``` - ##### `ResetGroupattr` ```go @@ -507,12 +499,6 @@ func ResetInsecureTls() func ResetLastRotationTolerance() ``` -##### `ResetLength` - -```go -func ResetLength() -``` - ##### `ResetLocal` ```go @@ -623,7 +609,7 @@ func ResetUseTokenGroups() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretbackend" adsecretbackend.AdSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -655,7 +641,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretbackend" adsecretbackend.AdSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -669,7 +655,7 @@ adsecretbackend.AdSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretbackend" adsecretbackend.AdSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -683,7 +669,7 @@ adsecretbackend.AdSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretbackend" adsecretbackend.AdSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -712,7 +698,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -755,14 +741,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | DescriptionInput | *string | *No description.* | | DisableRemountInput | interface{} | *No description.* | | DiscoverdnInput | interface{} | *No description.* | -| FormatterInput | *string | *No description.* | | GroupattrInput | *string | *No description.* | | GroupdnInput | *string | *No description.* | | GroupfilterInput | *string | *No description.* | | IdInput | *string | *No description.* | | InsecureTlsInput | interface{} | *No description.* | | LastRotationToleranceInput | *f64 | *No description.* | -| LengthInput | *f64 | *No description.* | | LocalInput | interface{} | *No description.* | | MaxLeaseTtlSecondsInput | *f64 | *No description.* | | MaxTtlInput | *f64 | *No description.* | @@ -792,14 +776,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Description | *string | *No description.* | | DisableRemount | interface{} | *No description.* | | Discoverdn | interface{} | *No description.* | -| Formatter | *string | *No description.* | | Groupattr | *string | *No description.* | | Groupdn | *string | *No description.* | | Groupfilter | *string | *No description.* | | Id | *string | *No description.* | | InsecureTls | interface{} | *No description.* | | LastRotationTolerance | *f64 | *No description.* | -| Length | *f64 | *No description.* | | Local | interface{} | *No description.* | | MaxLeaseTtlSeconds | *f64 | *No description.* | | MaxTtl | *f64 | *No description.* | @@ -1091,16 +1073,6 @@ func DiscoverdnInput() interface{} --- -##### `FormatterInput`Optional - -```go -func FormatterInput() *string -``` - -- *Type:* *string - ---- - ##### `GroupattrInput`Optional ```go @@ -1161,16 +1133,6 @@ func LastRotationToleranceInput() *f64 --- -##### `LengthInput`Optional - -```go -func LengthInput() *f64 -``` - -- *Type:* *f64 - ---- - ##### `LocalInput`Optional ```go @@ -1461,16 +1423,6 @@ func Discoverdn() interface{} --- -##### `Formatter`Required - -```go -func Formatter() *string -``` - -- *Type:* *string - ---- - ##### `Groupattr`Required ```go @@ -1531,16 +1483,6 @@ func LastRotationTolerance() *f64 --- -##### `Length`Required - -```go -func Length() *f64 -``` - -- *Type:* *f64 - ---- - ##### `Local`Required ```go @@ -1726,7 +1668,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretbackend" &adsecretbackend.AdSecretBackendConfig { Connection: interface{}, @@ -1749,14 +1691,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" Description: *string, DisableRemount: interface{}, Discoverdn: interface{}, - Formatter: *string, Groupattr: *string, Groupdn: *string, Groupfilter: *string, Id: *string, InsecureTls: interface{}, LastRotationTolerance: *f64, - Length: *f64, Local: interface{}, MaxLeaseTtlSeconds: *f64, MaxTtl: *f64, @@ -1800,14 +1740,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretbackend" | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | | Discoverdn | interface{} | Use anonymous bind to discover the bind DN of a user. | -| Formatter | *string | Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". | | Groupattr | *string | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | Groupdn | *string | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | Groupfilter | *string | Go template for querying group membership of user. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | InsecureTls | interface{} | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | LastRotationTolerance | *f64 | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | -| Length | *f64 | The desired length of passwords that Vault generates. | | Local | interface{} | Mark the secrets engine as local-only. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for secrets in seconds. | | MaxTtl | *f64 | In seconds, the maximum password time-to-live. | @@ -1907,7 +1845,7 @@ Binddn *string Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -1921,7 +1859,7 @@ Bindpass *string LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -1935,7 +1873,7 @@ AnonymousGroupSearch interface{} Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -1949,7 +1887,7 @@ Backend *string The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -1963,7 +1901,7 @@ CaseSensitiveNames interface{} If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -1977,7 +1915,7 @@ Certificate *string CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -1991,7 +1929,7 @@ ClientTlsCert *string Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -2005,7 +1943,7 @@ ClientTlsKey *string Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -2019,7 +1957,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -2033,7 +1971,7 @@ DenyNullBind interface{} Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -2047,7 +1985,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -2061,7 +1999,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -2075,21 +2013,7 @@ Discoverdn interface{} Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} - ---- - -##### `Formatter`Optional - -```go -Formatter *string -``` - -- *Type:* *string - -Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#formatter AdSecretBackend#formatter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -2105,7 +2029,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2119,7 +2043,7 @@ Groupdn *string LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2135,7 +2059,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2147,7 +2071,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2164,7 +2088,7 @@ InsecureTls interface{} Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2178,21 +2102,7 @@ LastRotationTolerance *f64 The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} - ---- - -##### `Length`Optional - -```go -Length *f64 -``` - -- *Type:* *f64 - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#length AdSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2208,7 +2118,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2222,7 +2132,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2236,7 +2146,7 @@ MaxTtl *f64 In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2250,7 +2160,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2264,7 +2174,7 @@ PasswordPolicy *string Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2278,7 +2188,7 @@ RequestTimeout *f64 Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2292,7 +2202,7 @@ Starttls interface{} Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2306,7 +2216,7 @@ TlsMaxVersion *string Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2320,7 +2230,7 @@ TlsMinVersion *string Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2334,7 +2244,7 @@ Ttl *f64 In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2348,7 +2258,7 @@ Upndomain *string Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2362,7 +2272,7 @@ Url *string LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2376,7 +2286,7 @@ UsePre111GroupCnBehavior interface{} In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2390,7 +2300,7 @@ Userattr *string Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2404,7 +2314,7 @@ Userdn *string LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2420,7 +2330,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretBackend.java.md b/docs/adSecretBackend.java.md index e6b8ffbe..ba2b9b5a 100644 --- a/docs/adSecretBackend.java.md +++ b/docs/adSecretBackend.java.md @@ -4,7 +4,7 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers @@ -41,7 +41,6 @@ AdSecretBackend.Builder.create(Construct scope, java.lang.String id) // .disableRemount(IResolvable) // .discoverdn(java.lang.Boolean) // .discoverdn(IResolvable) -// .formatter(java.lang.String) // .groupattr(java.lang.String) // .groupdn(java.lang.String) // .groupfilter(java.lang.String) @@ -49,7 +48,6 @@ AdSecretBackend.Builder.create(Construct scope, java.lang.String id) // .insecureTls(java.lang.Boolean) // .insecureTls(IResolvable) // .lastRotationTolerance(java.lang.Number) -// .length(java.lang.Number) // .local(java.lang.Boolean) // .local(IResolvable) // .maxLeaseTtlSeconds(java.lang.Number) @@ -97,14 +95,12 @@ AdSecretBackend.Builder.create(Construct scope, java.lang.String id) | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use anonymous bind to discover the bind DN of a user. | -| formatter | java.lang.String | Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". | | groupattr | java.lang.String | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | java.lang.String | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | java.lang.String | Go template for querying group membership of user. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | lastRotationTolerance | java.lang.Number | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | -| length | java.lang.Number | The desired length of passwords that Vault generates. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Mark the secrets engine as local-only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | maxTtl | java.lang.Number | In seconds, the maximum password time-to-live. | @@ -190,7 +186,7 @@ Must be unique amongst siblings in the same scope Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -200,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -210,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -220,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -230,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -240,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -250,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -260,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -270,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -280,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -290,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -300,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -310,17 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} - ---- - -##### `formatter`Optional - -- *Type:* java.lang.String - -Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#formatter AdSecretBackend#formatter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -332,7 +318,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -342,7 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -354,7 +340,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -362,7 +348,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -375,7 +361,7 @@ If you experience problems setting this value it might not be settable. Please t Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -385,17 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} - ---- - -##### `length`Optional - -- *Type:* java.lang.Number - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#length AdSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -407,7 +383,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -417,7 +393,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -427,7 +403,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -437,7 +413,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -447,7 +423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -457,7 +433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -467,7 +443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -477,7 +453,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -487,7 +463,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -497,7 +473,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -507,7 +483,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -517,7 +493,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -527,7 +503,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -537,7 +513,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -547,7 +523,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -559,7 +535,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- @@ -601,14 +577,12 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetDescription | *No description.* | | resetDisableRemount | *No description.* | | resetDiscoverdn | *No description.* | -| resetFormatter | *No description.* | | resetGroupattr | *No description.* | | resetGroupdn | *No description.* | | resetGroupfilter | *No description.* | | resetId | *No description.* | | resetInsecureTls | *No description.* | | resetLastRotationTolerance | *No description.* | -| resetLength | *No description.* | | resetLocal | *No description.* | | resetMaxLeaseTtlSeconds | *No description.* | | resetMaxTtl | *No description.* | @@ -984,12 +958,6 @@ public void resetDisableRemount() public void resetDiscoverdn() ``` -##### `resetFormatter` - -```java -public void resetFormatter() -``` - ##### `resetGroupattr` ```java @@ -1026,12 +994,6 @@ public void resetInsecureTls() public void resetLastRotationTolerance() ``` -##### `resetLength` - -```java -public void resetLength() -``` - ##### `resetLocal` ```java @@ -1231,7 +1193,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1274,14 +1236,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | descriptionInput | java.lang.String | *No description.* | | disableRemountInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | discoverdnInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | -| formatterInput | java.lang.String | *No description.* | | groupattrInput | java.lang.String | *No description.* | | groupdnInput | java.lang.String | *No description.* | | groupfilterInput | java.lang.String | *No description.* | | idInput | java.lang.String | *No description.* | | insecureTlsInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | lastRotationToleranceInput | java.lang.Number | *No description.* | -| lengthInput | java.lang.Number | *No description.* | | localInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | maxLeaseTtlSecondsInput | java.lang.Number | *No description.* | | maxTtlInput | java.lang.Number | *No description.* | @@ -1311,14 +1271,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | description | java.lang.String | *No description.* | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | -| formatter | java.lang.String | *No description.* | | groupattr | java.lang.String | *No description.* | | groupdn | java.lang.String | *No description.* | | groupfilter | java.lang.String | *No description.* | | id | java.lang.String | *No description.* | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | lastRotationTolerance | java.lang.Number | *No description.* | -| length | java.lang.Number | *No description.* | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | maxLeaseTtlSeconds | java.lang.Number | *No description.* | | maxTtl | java.lang.Number | *No description.* | @@ -1610,16 +1568,6 @@ public java.lang.Object getDiscoverdnInput(); --- -##### `formatterInput`Optional - -```java -public java.lang.String getFormatterInput(); -``` - -- *Type:* java.lang.String - ---- - ##### `groupattrInput`Optional ```java @@ -1680,16 +1628,6 @@ public java.lang.Number getLastRotationToleranceInput(); --- -##### `lengthInput`Optional - -```java -public java.lang.Number getLengthInput(); -``` - -- *Type:* java.lang.Number - ---- - ##### `localInput`Optional ```java @@ -1980,16 +1918,6 @@ public java.lang.Object getDiscoverdn(); --- -##### `formatter`Required - -```java -public java.lang.String getFormatter(); -``` - -- *Type:* java.lang.String - ---- - ##### `groupattr`Required ```java @@ -2050,16 +1978,6 @@ public java.lang.Number getLastRotationTolerance(); --- -##### `length`Required - -```java -public java.lang.Number getLength(); -``` - -- *Type:* java.lang.Number - ---- - ##### `local`Required ```java @@ -2277,7 +2195,6 @@ AdSecretBackendConfig.builder() // .disableRemount(IResolvable) // .discoverdn(java.lang.Boolean) // .discoverdn(IResolvable) -// .formatter(java.lang.String) // .groupattr(java.lang.String) // .groupdn(java.lang.String) // .groupfilter(java.lang.String) @@ -2285,7 +2202,6 @@ AdSecretBackendConfig.builder() // .insecureTls(java.lang.Boolean) // .insecureTls(IResolvable) // .lastRotationTolerance(java.lang.Number) -// .length(java.lang.Number) // .local(java.lang.Boolean) // .local(IResolvable) // .maxLeaseTtlSeconds(java.lang.Number) @@ -2333,14 +2249,12 @@ AdSecretBackendConfig.builder() | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use anonymous bind to discover the bind DN of a user. | -| formatter | java.lang.String | Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". | | groupattr | java.lang.String | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | java.lang.String | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | java.lang.String | Go template for querying group membership of user. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | lastRotationTolerance | java.lang.Number | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | -| length | java.lang.Number | The desired length of passwords that Vault generates. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Mark the secrets engine as local-only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | maxTtl | java.lang.Number | In seconds, the maximum password time-to-live. | @@ -2440,7 +2354,7 @@ public java.lang.String getBinddn(); Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -2454,7 +2368,7 @@ public java.lang.String getBindpass(); LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -2468,7 +2382,7 @@ public java.lang.Object getAnonymousGroupSearch(); Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -2482,7 +2396,7 @@ public java.lang.String getBackend(); The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -2496,7 +2410,7 @@ public java.lang.Object getCaseSensitiveNames(); If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -2510,7 +2424,7 @@ public java.lang.String getCertificate(); CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -2524,7 +2438,7 @@ public java.lang.String getClientTlsCert(); Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -2538,7 +2452,7 @@ public java.lang.String getClientTlsKey(); Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -2552,7 +2466,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -2566,7 +2480,7 @@ public java.lang.Object getDenyNullBind(); Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -2580,7 +2494,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -2594,7 +2508,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -2608,21 +2522,7 @@ public java.lang.Object getDiscoverdn(); Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} - ---- - -##### `formatter`Optional - -```java -public java.lang.String getFormatter(); -``` - -- *Type:* java.lang.String - -Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#formatter AdSecretBackend#formatter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -2638,7 +2538,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2652,7 +2552,7 @@ public java.lang.String getGroupdn(); LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2668,7 +2568,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2680,7 +2580,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2697,7 +2597,7 @@ public java.lang.Object getInsecureTls(); Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2711,21 +2611,7 @@ public java.lang.Number getLastRotationTolerance(); The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} - ---- - -##### `length`Optional - -```java -public java.lang.Number getLength(); -``` - -- *Type:* java.lang.Number - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#length AdSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2741,7 +2627,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2755,7 +2641,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2769,7 +2655,7 @@ public java.lang.Number getMaxTtl(); In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2783,7 +2669,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2797,7 +2683,7 @@ public java.lang.String getPasswordPolicy(); Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2811,7 +2697,7 @@ public java.lang.Number getRequestTimeout(); Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2825,7 +2711,7 @@ public java.lang.Object getStarttls(); Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2839,7 +2725,7 @@ public java.lang.String getTlsMaxVersion(); Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2853,7 +2739,7 @@ public java.lang.String getTlsMinVersion(); Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2867,7 +2753,7 @@ public java.lang.Number getTtl(); In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2881,7 +2767,7 @@ public java.lang.String getUpndomain(); Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2895,7 +2781,7 @@ public java.lang.String getUrl(); LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2909,7 +2795,7 @@ public java.lang.Object getUsePre111GroupCnBehavior(); In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2923,7 +2809,7 @@ public java.lang.String getUserattr(); Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2937,7 +2823,7 @@ public java.lang.String getUserdn(); LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2953,7 +2839,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretBackend.python.md b/docs/adSecretBackend.python.md index b1038dfa..a461828a 100644 --- a/docs/adSecretBackend.python.md +++ b/docs/adSecretBackend.python.md @@ -4,7 +4,7 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers @@ -34,14 +34,12 @@ adSecretBackend.AdSecretBackend( description: str = None, disable_remount: typing.Union[bool, IResolvable] = None, discoverdn: typing.Union[bool, IResolvable] = None, - formatter: str = None, groupattr: str = None, groupdn: str = None, groupfilter: str = None, id: str = None, insecure_tls: typing.Union[bool, IResolvable] = None, last_rotation_tolerance: typing.Union[int, float] = None, - length: typing.Union[int, float] = None, local: typing.Union[bool, IResolvable] = None, max_lease_ttl_seconds: typing.Union[int, float] = None, max_ttl: typing.Union[int, float] = None, @@ -85,14 +83,12 @@ adSecretBackend.AdSecretBackend( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | discoverdn | typing.Union[bool, cdktf.IResolvable] | Use anonymous bind to discover the bind DN of a user. | -| formatter | str | Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". | | groupattr | str | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | str | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | str | Go template for querying group membership of user. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | last_rotation_tolerance | typing.Union[int, float] | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | -| length | typing.Union[int, float] | The desired length of passwords that Vault generates. | | local | typing.Union[bool, cdktf.IResolvable] | Mark the secrets engine as local-only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | max_ttl | typing.Union[int, float] | In seconds, the maximum password time-to-live. | @@ -178,7 +174,7 @@ Must be unique amongst siblings in the same scope Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -188,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -198,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -208,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -218,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -228,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -238,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -248,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -258,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -268,7 +264,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -278,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -288,7 +284,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -298,17 +294,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} - ---- - -##### `formatter`Optional - -- *Type:* str - -Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#formatter AdSecretBackend#formatter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -320,7 +306,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -330,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -342,7 +328,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -350,7 +336,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -363,7 +349,7 @@ If you experience problems setting this value it might not be settable. Please t Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -373,17 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} - ---- - -##### `length`Optional - -- *Type:* typing.Union[int, float] - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#length AdSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -395,7 +371,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -405,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -415,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -425,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -435,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -445,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -455,7 +431,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -465,7 +441,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -475,7 +451,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -485,7 +461,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -495,7 +471,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -505,7 +481,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -515,7 +491,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -525,7 +501,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -535,7 +511,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -547,7 +523,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- @@ -589,14 +565,12 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_description | *No description.* | | reset_disable_remount | *No description.* | | reset_discoverdn | *No description.* | -| reset_formatter | *No description.* | | reset_groupattr | *No description.* | | reset_groupdn | *No description.* | | reset_groupfilter | *No description.* | | reset_id | *No description.* | | reset_insecure_tls | *No description.* | | reset_last_rotation_tolerance | *No description.* | -| reset_length | *No description.* | | reset_local | *No description.* | | reset_max_lease_ttl_seconds | *No description.* | | reset_max_ttl | *No description.* | @@ -1007,12 +981,6 @@ def reset_disable_remount() -> None def reset_discoverdn() -> None ``` -##### `reset_formatter` - -```python -def reset_formatter() -> None -``` - ##### `reset_groupattr` ```python @@ -1049,12 +1017,6 @@ def reset_insecure_tls() -> None def reset_last_rotation_tolerance() -> None ``` -##### `reset_length` - -```python -def reset_length() -> None -``` - ##### `reset_local` ```python @@ -1265,7 +1227,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1308,14 +1270,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | description_input | str | *No description.* | | disable_remount_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | discoverdn_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | -| formatter_input | str | *No description.* | | groupattr_input | str | *No description.* | | groupdn_input | str | *No description.* | | groupfilter_input | str | *No description.* | | id_input | str | *No description.* | | insecure_tls_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | last_rotation_tolerance_input | typing.Union[int, float] | *No description.* | -| length_input | typing.Union[int, float] | *No description.* | | local_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | max_lease_ttl_seconds_input | typing.Union[int, float] | *No description.* | | max_ttl_input | typing.Union[int, float] | *No description.* | @@ -1345,14 +1305,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | description | str | *No description.* | | disable_remount | typing.Union[bool, cdktf.IResolvable] | *No description.* | | discoverdn | typing.Union[bool, cdktf.IResolvable] | *No description.* | -| formatter | str | *No description.* | | groupattr | str | *No description.* | | groupdn | str | *No description.* | | groupfilter | str | *No description.* | | id | str | *No description.* | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | *No description.* | | last_rotation_tolerance | typing.Union[int, float] | *No description.* | -| length | typing.Union[int, float] | *No description.* | | local | typing.Union[bool, cdktf.IResolvable] | *No description.* | | max_lease_ttl_seconds | typing.Union[int, float] | *No description.* | | max_ttl | typing.Union[int, float] | *No description.* | @@ -1644,16 +1602,6 @@ discoverdn_input: typing.Union[bool, IResolvable] --- -##### `formatter_input`Optional - -```python -formatter_input: str -``` - -- *Type:* str - ---- - ##### `groupattr_input`Optional ```python @@ -1714,16 +1662,6 @@ last_rotation_tolerance_input: typing.Union[int, float] --- -##### `length_input`Optional - -```python -length_input: typing.Union[int, float] -``` - -- *Type:* typing.Union[int, float] - ---- - ##### `local_input`Optional ```python @@ -2014,16 +1952,6 @@ discoverdn: typing.Union[bool, IResolvable] --- -##### `formatter`Required - -```python -formatter: str -``` - -- *Type:* str - ---- - ##### `groupattr`Required ```python @@ -2084,16 +2012,6 @@ last_rotation_tolerance: typing.Union[int, float] --- -##### `length`Required - -```python -length: typing.Union[int, float] -``` - -- *Type:* typing.Union[int, float] - ---- - ##### `local`Required ```python @@ -2302,14 +2220,12 @@ adSecretBackend.AdSecretBackendConfig( description: str = None, disable_remount: typing.Union[bool, IResolvable] = None, discoverdn: typing.Union[bool, IResolvable] = None, - formatter: str = None, groupattr: str = None, groupdn: str = None, groupfilter: str = None, id: str = None, insecure_tls: typing.Union[bool, IResolvable] = None, last_rotation_tolerance: typing.Union[int, float] = None, - length: typing.Union[int, float] = None, local: typing.Union[bool, IResolvable] = None, max_lease_ttl_seconds: typing.Union[int, float] = None, max_ttl: typing.Union[int, float] = None, @@ -2353,14 +2269,12 @@ adSecretBackend.AdSecretBackendConfig( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | discoverdn | typing.Union[bool, cdktf.IResolvable] | Use anonymous bind to discover the bind DN of a user. | -| formatter | str | Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". | | groupattr | str | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | str | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | str | Go template for querying group membership of user. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | last_rotation_tolerance | typing.Union[int, float] | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | -| length | typing.Union[int, float] | The desired length of passwords that Vault generates. | | local | typing.Union[bool, cdktf.IResolvable] | Mark the secrets engine as local-only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | max_ttl | typing.Union[int, float] | In seconds, the maximum password time-to-live. | @@ -2460,7 +2374,7 @@ binddn: str Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -2474,7 +2388,7 @@ bindpass: str LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -2488,7 +2402,7 @@ anonymous_group_search: typing.Union[bool, IResolvable] Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -2502,7 +2416,7 @@ backend: str The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -2516,7 +2430,7 @@ case_sensitive_names: typing.Union[bool, IResolvable] If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -2530,7 +2444,7 @@ certificate: str CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -2544,7 +2458,7 @@ client_tls_cert: str Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -2558,7 +2472,7 @@ client_tls_key: str Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -2572,7 +2486,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -2586,7 +2500,7 @@ deny_null_bind: typing.Union[bool, IResolvable] Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -2600,7 +2514,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -2614,7 +2528,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -2628,21 +2542,7 @@ discoverdn: typing.Union[bool, IResolvable] Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} - ---- - -##### `formatter`Optional - -```python -formatter: str -``` - -- *Type:* str - -Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#formatter AdSecretBackend#formatter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -2658,7 +2558,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2672,7 +2572,7 @@ groupdn: str LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2688,7 +2588,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2700,7 +2600,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2717,7 +2617,7 @@ insecure_tls: typing.Union[bool, IResolvable] Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2731,21 +2631,7 @@ last_rotation_tolerance: typing.Union[int, float] The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} - ---- - -##### `length`Optional - -```python -length: typing.Union[int, float] -``` - -- *Type:* typing.Union[int, float] - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#length AdSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2761,7 +2647,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2775,7 +2661,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2789,7 +2675,7 @@ max_ttl: typing.Union[int, float] In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2803,7 +2689,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2817,7 +2703,7 @@ password_policy: str Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2831,7 +2717,7 @@ request_timeout: typing.Union[int, float] Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2845,7 +2731,7 @@ starttls: typing.Union[bool, IResolvable] Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2859,7 +2745,7 @@ tls_max_version: str Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2873,7 +2759,7 @@ tls_min_version: str Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2887,7 +2773,7 @@ ttl: typing.Union[int, float] In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2901,7 +2787,7 @@ upndomain: str Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2915,7 +2801,7 @@ url: str LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2929,7 +2815,7 @@ use_pre111_group_cn_behavior: typing.Union[bool, IResolvable] In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2943,7 +2829,7 @@ userattr: str Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2957,7 +2843,7 @@ userdn: str LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2973,7 +2859,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretBackend.typescript.md b/docs/adSecretBackend.typescript.md index 798b43d2..3e1d3bd7 100644 --- a/docs/adSecretBackend.typescript.md +++ b/docs/adSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers @@ -84,14 +84,12 @@ Must be unique amongst siblings in the same scope | resetDescription | *No description.* | | resetDisableRemount | *No description.* | | resetDiscoverdn | *No description.* | -| resetFormatter | *No description.* | | resetGroupattr | *No description.* | | resetGroupdn | *No description.* | | resetGroupfilter | *No description.* | | resetId | *No description.* | | resetInsecureTls | *No description.* | | resetLastRotationTolerance | *No description.* | -| resetLength | *No description.* | | resetLocal | *No description.* | | resetMaxLeaseTtlSeconds | *No description.* | | resetMaxTtl | *No description.* | @@ -465,12 +463,6 @@ public resetDisableRemount(): void public resetDiscoverdn(): void ``` -##### `resetFormatter` - -```typescript -public resetFormatter(): void -``` - ##### `resetGroupattr` ```typescript @@ -507,12 +499,6 @@ public resetInsecureTls(): void public resetLastRotationTolerance(): void ``` -##### `resetLength` - -```typescript -public resetLength(): void -``` - ##### `resetLocal` ```typescript @@ -712,7 +698,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -755,14 +741,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | descriptionInput | string | *No description.* | | disableRemountInput | boolean \| cdktf.IResolvable | *No description.* | | discoverdnInput | boolean \| cdktf.IResolvable | *No description.* | -| formatterInput | string | *No description.* | | groupattrInput | string | *No description.* | | groupdnInput | string | *No description.* | | groupfilterInput | string | *No description.* | | idInput | string | *No description.* | | insecureTlsInput | boolean \| cdktf.IResolvable | *No description.* | | lastRotationToleranceInput | number | *No description.* | -| lengthInput | number | *No description.* | | localInput | boolean \| cdktf.IResolvable | *No description.* | | maxLeaseTtlSecondsInput | number | *No description.* | | maxTtlInput | number | *No description.* | @@ -792,14 +776,12 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | description | string | *No description.* | | disableRemount | boolean \| cdktf.IResolvable | *No description.* | | discoverdn | boolean \| cdktf.IResolvable | *No description.* | -| formatter | string | *No description.* | | groupattr | string | *No description.* | | groupdn | string | *No description.* | | groupfilter | string | *No description.* | | id | string | *No description.* | | insecureTls | boolean \| cdktf.IResolvable | *No description.* | | lastRotationTolerance | number | *No description.* | -| length | number | *No description.* | | local | boolean \| cdktf.IResolvable | *No description.* | | maxLeaseTtlSeconds | number | *No description.* | | maxTtl | number | *No description.* | @@ -1091,16 +1073,6 @@ public readonly discoverdnInput: boolean | IResolvable; --- -##### `formatterInput`Optional - -```typescript -public readonly formatterInput: string; -``` - -- *Type:* string - ---- - ##### `groupattrInput`Optional ```typescript @@ -1161,16 +1133,6 @@ public readonly lastRotationToleranceInput: number; --- -##### `lengthInput`Optional - -```typescript -public readonly lengthInput: number; -``` - -- *Type:* number - ---- - ##### `localInput`Optional ```typescript @@ -1461,16 +1423,6 @@ public readonly discoverdn: boolean | IResolvable; --- -##### `formatter`Required - -```typescript -public readonly formatter: string; -``` - -- *Type:* string - ---- - ##### `groupattr`Required ```typescript @@ -1531,16 +1483,6 @@ public readonly lastRotationTolerance: number; --- -##### `length`Required - -```typescript -public readonly length: number; -``` - -- *Type:* number - ---- - ##### `local`Required ```typescript @@ -1755,14 +1697,12 @@ const adSecretBackendConfig: adSecretBackend.AdSecretBackendConfig = { ... } | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | | discoverdn | boolean \| cdktf.IResolvable | Use anonymous bind to discover the bind DN of a user. | -| formatter | string | Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". | | groupattr | string | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | string | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | string | Go template for querying group membership of user. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecureTls | boolean \| cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | lastRotationTolerance | number | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | -| length | number | The desired length of passwords that Vault generates. | | local | boolean \| cdktf.IResolvable | Mark the secrets engine as local-only. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for secrets in seconds. | | maxTtl | number | In seconds, the maximum password time-to-live. | @@ -1862,7 +1802,7 @@ public readonly binddn: string; Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -1876,7 +1816,7 @@ public readonly bindpass: string; LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -1890,7 +1830,7 @@ public readonly anonymousGroupSearch: boolean | IResolvable; Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -1904,7 +1844,7 @@ public readonly backend: string; The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -1918,7 +1858,7 @@ public readonly caseSensitiveNames: boolean | IResolvable; If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -1932,7 +1872,7 @@ public readonly certificate: string; CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -1946,7 +1886,7 @@ public readonly clientTlsCert: string; Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -1960,7 +1900,7 @@ public readonly clientTlsKey: string; Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -1974,7 +1914,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -1988,7 +1928,7 @@ public readonly denyNullBind: boolean | IResolvable; Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -2002,7 +1942,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -2016,7 +1956,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -2030,21 +1970,7 @@ public readonly discoverdn: boolean | IResolvable; Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} - ---- - -##### `formatter`Optional - -```typescript -public readonly formatter: string; -``` - -- *Type:* string - -Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#formatter AdSecretBackend#formatter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -2060,7 +1986,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2074,7 +2000,7 @@ public readonly groupdn: string; LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2090,7 +2016,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2102,7 +2028,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2119,7 +2045,7 @@ public readonly insecureTls: boolean | IResolvable; Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2133,21 +2059,7 @@ public readonly lastRotationTolerance: number; The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} - ---- - -##### `length`Optional - -```typescript -public readonly length: number; -``` - -- *Type:* number - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#length AdSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2163,7 +2075,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2177,7 +2089,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2191,7 +2103,7 @@ public readonly maxTtl: number; In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2205,7 +2117,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2219,7 +2131,7 @@ public readonly passwordPolicy: string; Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2233,7 +2145,7 @@ public readonly requestTimeout: number; Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2247,7 +2159,7 @@ public readonly starttls: boolean | IResolvable; Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2261,7 +2173,7 @@ public readonly tlsMaxVersion: string; Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2275,7 +2187,7 @@ public readonly tlsMinVersion: string; Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2289,7 +2201,7 @@ public readonly ttl: number; In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2303,7 +2215,7 @@ public readonly upndomain: string; Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2317,7 +2229,7 @@ public readonly url: string; LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2331,7 +2243,7 @@ public readonly usePre111GroupCnBehavior: boolean | IResolvable; In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2345,7 +2257,7 @@ public readonly userattr: string; Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2359,7 +2271,7 @@ public readonly userdn: string; LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2375,7 +2287,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretLibrary.csharp.md b/docs/adSecretLibrary.csharp.md index aa03da90..a0ffeece 100644 --- a/docs/adSecretLibrary.csharp.md +++ b/docs/adSecretLibrary.csharp.md @@ -4,7 +4,7 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ new AdSecretLibraryConfig { | Name | string | The name of the set of service accounts. | | ServiceAccountNames | string[] | The names of all the service accounts that can be checked out from this set. | | DisableCheckInEnforcement | object | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | MaxTtl | double | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | Namespace | string | Target namespace. (requires Enterprise). | | Ttl | double | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -1001,7 +1001,7 @@ public string Backend { get; set; } The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -1015,7 +1015,7 @@ public string Name { get; set; } The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1031,7 +1031,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1045,7 +1045,7 @@ public object DisableCheckInEnforcement { get; set; } Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1057,7 +1057,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1074,7 +1074,7 @@ public double MaxTtl { get; set; } The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1088,7 +1088,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1102,7 +1102,7 @@ public double Ttl { get; set; } The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretLibrary.go.md b/docs/adSecretLibrary.go.md index 021a6d66..f551de30 100644 --- a/docs/adSecretLibrary.go.md +++ b/docs/adSecretLibrary.go.md @@ -4,12 +4,12 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretlibrary" adsecretlibrary.NewAdSecretLibrary(scope Construct, id *string, config AdSecretLibraryConfig) AdSecretLibrary ``` @@ -413,7 +413,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretlibrary" adsecretlibrary.AdSecretLibrary_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretlibrary" adsecretlibrary.AdSecretLibrary_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ adsecretlibrary.AdSecretLibrary_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretlibrary" adsecretlibrary.AdSecretLibrary_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ adsecretlibrary.AdSecretLibrary_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretlibrary" adsecretlibrary.AdSecretLibrary_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -878,7 +878,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretlibrary" &adsecretlibrary.AdSecretLibraryConfig { Connection: interface{}, @@ -914,7 +914,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretlibrary" | Name | *string | The name of the set of service accounts. | | ServiceAccountNames | *[]*string | The names of all the service accounts that can be checked out from this set. | | DisableCheckInEnforcement | interface{} | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | MaxTtl | *f64 | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | Namespace | *string | Target namespace. (requires Enterprise). | | Ttl | *f64 | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -1001,7 +1001,7 @@ Backend *string The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -1015,7 +1015,7 @@ Name *string The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1031,7 +1031,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1045,7 +1045,7 @@ DisableCheckInEnforcement interface{} Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1057,7 +1057,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1074,7 +1074,7 @@ MaxTtl *f64 The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1088,7 +1088,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1102,7 +1102,7 @@ Ttl *f64 The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretLibrary.java.md b/docs/adSecretLibrary.java.md index 8cc2eb4a..c4431f3a 100644 --- a/docs/adSecretLibrary.java.md +++ b/docs/adSecretLibrary.java.md @@ -4,7 +4,7 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers @@ -50,7 +50,7 @@ AdSecretLibrary.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the set of service accounts. | | serviceAccountNames | java.util.List | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | maxTtl | java.lang.Number | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.Number | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -145,7 +145,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- @@ -658,7 +658,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -1075,7 +1075,7 @@ AdSecretLibraryConfig.builder() | name | java.lang.String | The name of the set of service accounts. | | serviceAccountNames | java.util.List | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | maxTtl | java.lang.Number | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.Number | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -1162,7 +1162,7 @@ public java.lang.String getBackend(); The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -1176,7 +1176,7 @@ public java.lang.String getName(); The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1192,7 +1192,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1206,7 +1206,7 @@ public java.lang.Object getDisableCheckInEnforcement(); Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1218,7 +1218,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1235,7 +1235,7 @@ public java.lang.Number getMaxTtl(); The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1249,7 +1249,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1263,7 +1263,7 @@ public java.lang.Number getTtl(); The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretLibrary.python.md b/docs/adSecretLibrary.python.md index 662ef0a0..99c54c28 100644 --- a/docs/adSecretLibrary.python.md +++ b/docs/adSecretLibrary.python.md @@ -4,7 +4,7 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers @@ -47,7 +47,7 @@ adSecretLibrary.AdSecretLibrary( | name | str | The name of the set of service accounts. | | service_account_names | typing.List[str] | The names of all the service accounts that can be checked out from this set. | | disable_check_in_enforcement | typing.Union[bool, cdktf.IResolvable] | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | max_ttl | typing.Union[int, float] | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | typing.Union[int, float] | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -142,7 +142,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- @@ -701,7 +701,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -1113,7 +1113,7 @@ adSecretLibrary.AdSecretLibraryConfig( | name | str | The name of the set of service accounts. | | service_account_names | typing.List[str] | The names of all the service accounts that can be checked out from this set. | | disable_check_in_enforcement | typing.Union[bool, cdktf.IResolvable] | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | max_ttl | typing.Union[int, float] | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | typing.Union[int, float] | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -1200,7 +1200,7 @@ backend: str The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -1214,7 +1214,7 @@ name: str The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1230,7 +1230,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1244,7 +1244,7 @@ disable_check_in_enforcement: typing.Union[bool, IResolvable] Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1256,7 +1256,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1273,7 +1273,7 @@ max_ttl: typing.Union[int, float] The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1287,7 +1287,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1301,7 +1301,7 @@ ttl: typing.Union[int, float] The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretLibrary.typescript.md b/docs/adSecretLibrary.typescript.md index 75068bb0..afae3fe5 100644 --- a/docs/adSecretLibrary.typescript.md +++ b/docs/adSecretLibrary.typescript.md @@ -4,7 +4,7 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -898,7 +898,7 @@ const adSecretLibraryConfig: adSecretLibrary.AdSecretLibraryConfig = { ... } | name | string | The name of the set of service accounts. | | serviceAccountNames | string[] | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | boolean \| cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | maxTtl | number | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | string | Target namespace. (requires Enterprise). | | ttl | number | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -985,7 +985,7 @@ public readonly backend: string; The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -999,7 +999,7 @@ public readonly name: string; The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1015,7 +1015,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1029,7 +1029,7 @@ public readonly disableCheckInEnforcement: boolean | IResolvable; Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1041,7 +1041,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1058,7 +1058,7 @@ public readonly maxTtl: number; The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1072,7 +1072,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1086,7 +1086,7 @@ public readonly ttl: number; The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretRole.csharp.md b/docs/adSecretRole.csharp.md index 8bdfa2d5..1cc3c6b2 100644 --- a/docs/adSecretRole.csharp.md +++ b/docs/adSecretRole.csharp.md @@ -4,7 +4,7 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ new AdSecretRoleConfig { | Backend | string | The mount path for the AD backend. | | Role | string | Name of the role. | | ServiceAccountName | string | The username/logon name for the service account with which this role will be associated. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Ttl | double | In seconds, the default password time-to-live. | @@ -961,7 +961,7 @@ public string Backend { get; set; } The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -975,7 +975,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -989,7 +989,7 @@ public string ServiceAccountName { get; set; } The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -1001,7 +1001,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1018,7 +1018,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1032,7 +1032,7 @@ public double Ttl { get; set; } In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/adSecretRole.go.md b/docs/adSecretRole.go.md index bffd0895..cbc81c0d 100644 --- a/docs/adSecretRole.go.md +++ b/docs/adSecretRole.go.md @@ -4,12 +4,12 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretrole" adsecretrole.NewAdSecretRole(scope Construct, id *string, config AdSecretRoleConfig) AdSecretRole ``` @@ -399,7 +399,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretrole" adsecretrole.AdSecretRole_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretrole" adsecretrole.AdSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ adsecretrole.AdSecretRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretrole" adsecretrole.AdSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ adsecretrole.AdSecretRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretrole" adsecretrole.AdSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -842,7 +842,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretrole" &adsecretrole.AdSecretRoleConfig { Connection: interface{}, @@ -875,7 +875,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/adsecretrole" | Backend | *string | The mount path for the AD backend. | | Role | *string | Name of the role. | | ServiceAccountName | *string | The username/logon name for the service account with which this role will be associated. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Ttl | *f64 | In seconds, the default password time-to-live. | @@ -961,7 +961,7 @@ Backend *string The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -975,7 +975,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -989,7 +989,7 @@ ServiceAccountName *string The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -1001,7 +1001,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1018,7 +1018,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1032,7 +1032,7 @@ Ttl *f64 In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/adSecretRole.java.md b/docs/adSecretRole.java.md index e3741f05..af68b874 100644 --- a/docs/adSecretRole.java.md +++ b/docs/adSecretRole.java.md @@ -4,7 +4,7 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers @@ -46,7 +46,7 @@ AdSecretRole.Builder.create(Construct scope, java.lang.String id) | backend | java.lang.String | The mount path for the AD backend. | | role | java.lang.String | Name of the role. | | serviceAccountName | java.lang.String | The username/logon name for the service account with which this role will be associated. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.Number | In seconds, the default password time-to-live. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- @@ -617,7 +617,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1008,7 +1008,7 @@ AdSecretRoleConfig.builder() | backend | java.lang.String | The mount path for the AD backend. | | role | java.lang.String | Name of the role. | | serviceAccountName | java.lang.String | The username/logon name for the service account with which this role will be associated. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.Number | In seconds, the default password time-to-live. | @@ -1094,7 +1094,7 @@ public java.lang.String getBackend(); The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -1108,7 +1108,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -1122,7 +1122,7 @@ public java.lang.String getServiceAccountName(); The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -1134,7 +1134,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1151,7 +1151,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1165,7 +1165,7 @@ public java.lang.Number getTtl(); In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/adSecretRole.python.md b/docs/adSecretRole.python.md index 0fb3a114..c9075906 100644 --- a/docs/adSecretRole.python.md +++ b/docs/adSecretRole.python.md @@ -4,7 +4,7 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers @@ -44,7 +44,7 @@ adSecretRole.AdSecretRole( | backend | str | The mount path for the AD backend. | | role | str | Name of the role. | | service_account_name | str | The username/logon name for the service account with which this role will be associated. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | typing.Union[int, float] | In seconds, the default password time-to-live. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1048,7 +1048,7 @@ adSecretRole.AdSecretRoleConfig( | backend | str | The mount path for the AD backend. | | role | str | Name of the role. | | service_account_name | str | The username/logon name for the service account with which this role will be associated. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | typing.Union[int, float] | In seconds, the default password time-to-live. | @@ -1134,7 +1134,7 @@ backend: str The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -1148,7 +1148,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -1162,7 +1162,7 @@ service_account_name: str The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -1174,7 +1174,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1191,7 +1191,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1205,7 +1205,7 @@ ttl: typing.Union[int, float] In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/adSecretRole.typescript.md b/docs/adSecretRole.typescript.md index 203ecba1..e4ceeb39 100644 --- a/docs/adSecretRole.typescript.md +++ b/docs/adSecretRole.typescript.md @@ -4,7 +4,7 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -861,7 +861,7 @@ const adSecretRoleConfig: adSecretRole.AdSecretRoleConfig = { ... } | backend | string | The mount path for the AD backend. | | role | string | Name of the role. | | serviceAccountName | string | The username/logon name for the service account with which this role will be associated. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | ttl | number | In seconds, the default password time-to-live. | @@ -947,7 +947,7 @@ public readonly backend: string; The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -961,7 +961,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -975,7 +975,7 @@ public readonly serviceAccountName: string; The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -987,7 +987,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1018,7 +1018,7 @@ public readonly ttl: number; In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/alicloudAuthBackendRole.csharp.md b/docs/alicloudAuthBackendRole.csharp.md index 1f6f3e78..64302e1a 100644 --- a/docs/alicloudAuthBackendRole.csharp.md +++ b/docs/alicloudAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1100,7 +1100,7 @@ new AlicloudAuthBackendRoleConfig { | Arn | string | The role's arn. | | Role | string | Name of the role. Must correspond with the name of the role reflected in the arn. | | Backend | string | Auth backend. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1194,7 +1194,7 @@ public string Arn { get; set; } The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1208,7 +1208,7 @@ public string Role { get; set; } Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1222,7 +1222,7 @@ public string Backend { get; set; } Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1234,7 +1234,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1251,7 +1251,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1265,7 +1265,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1279,7 +1279,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1293,7 +1293,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1307,7 +1307,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1321,7 +1321,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1335,7 +1335,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1349,7 +1349,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1363,7 +1363,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1377,7 +1377,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/alicloudAuthBackendRole.go.md b/docs/alicloudAuthBackendRole.go.md index 5e5b7d16..5a610fc0 100644 --- a/docs/alicloudAuthBackendRole.go.md +++ b/docs/alicloudAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/alicloudauthbackendrole" alicloudauthbackendrole.NewAlicloudAuthBackendRole(scope Construct, id *string, config AlicloudAuthBackendRoleConfig) AlicloudAuthBackendRole ``` @@ -462,7 +462,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/alicloudauthbackendrole" alicloudauthbackendrole.AlicloudAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -494,7 +494,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/alicloudauthbackendrole" alicloudauthbackendrole.AlicloudAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -508,7 +508,7 @@ alicloudauthbackendrole.AlicloudAuthBackendRole_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/alicloudauthbackendrole" alicloudauthbackendrole.AlicloudAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -522,7 +522,7 @@ alicloudauthbackendrole.AlicloudAuthBackendRole_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/alicloudauthbackendrole" alicloudauthbackendrole.AlicloudAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -551,7 +551,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1059,7 +1059,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/alicloudauthbackendrole" &alicloudauthbackendrole.AlicloudAuthBackendRoleConfig { Connection: interface{}, @@ -1100,7 +1100,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/alicloudauthbackendro | Arn | *string | The role's arn. | | Role | *string | Name of the role. Must correspond with the name of the role reflected in the arn. | | Backend | *string | Auth backend. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1194,7 +1194,7 @@ Arn *string The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1208,7 +1208,7 @@ Role *string Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1222,7 +1222,7 @@ Backend *string Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1234,7 +1234,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1251,7 +1251,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1265,7 +1265,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1279,7 +1279,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1293,7 +1293,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1307,7 +1307,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1321,7 +1321,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1335,7 +1335,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1349,7 +1349,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1363,7 +1363,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1377,7 +1377,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/alicloudAuthBackendRole.java.md b/docs/alicloudAuthBackendRole.java.md index 056a753a..cf8124de 100644 --- a/docs/alicloudAuthBackendRole.java.md +++ b/docs/alicloudAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers @@ -55,7 +55,7 @@ AlicloudAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | arn | java.lang.String | The role's arn. | | role | java.lang.String | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | java.lang.String | Auth backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- @@ -777,7 +777,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1331,7 +1331,7 @@ AlicloudAuthBackendRoleConfig.builder() | arn | java.lang.String | The role's arn. | | role | java.lang.String | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | java.lang.String | Auth backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1425,7 +1425,7 @@ public java.lang.String getArn(); The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1439,7 +1439,7 @@ public java.lang.String getRole(); Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1453,7 +1453,7 @@ public java.lang.String getBackend(); Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1465,7 +1465,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1482,7 +1482,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1496,7 +1496,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1510,7 +1510,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1524,7 +1524,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1538,7 +1538,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1552,7 +1552,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1566,7 +1566,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1580,7 +1580,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1594,7 +1594,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1608,7 +1608,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/alicloudAuthBackendRole.python.md b/docs/alicloudAuthBackendRole.python.md index 1961f9c9..15ae9e1d 100644 --- a/docs/alicloudAuthBackendRole.python.md +++ b/docs/alicloudAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers @@ -52,7 +52,7 @@ alicloudAuthBackendRole.AlicloudAuthBackendRole( | arn | str | The role's arn. | | role | str | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | str | Auth backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- @@ -820,7 +820,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1369,7 +1369,7 @@ alicloudAuthBackendRole.AlicloudAuthBackendRoleConfig( | arn | str | The role's arn. | | role | str | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | str | Auth backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1463,7 +1463,7 @@ arn: str The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1477,7 +1477,7 @@ role: str Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1491,7 +1491,7 @@ backend: str Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1503,7 +1503,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1520,7 +1520,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1534,7 +1534,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1548,7 +1548,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1562,7 +1562,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1576,7 +1576,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1590,7 +1590,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1604,7 +1604,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1618,7 +1618,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1632,7 +1632,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1646,7 +1646,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/alicloudAuthBackendRole.typescript.md b/docs/alicloudAuthBackendRole.typescript.md index 458ac46e..8440a5c7 100644 --- a/docs/alicloudAuthBackendRole.typescript.md +++ b/docs/alicloudAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1078,7 +1078,7 @@ const alicloudAuthBackendRoleConfig: alicloudAuthBackendRole.AlicloudAuthBackend | arn | string | The role's arn. | | role | string | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | string | Auth backend. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1172,7 +1172,7 @@ public readonly arn: string; The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1186,7 +1186,7 @@ public readonly role: string; Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1200,7 +1200,7 @@ public readonly backend: string; Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1212,7 +1212,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1229,7 +1229,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1243,7 +1243,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1257,7 +1257,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1271,7 +1271,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1285,7 +1285,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1299,7 +1299,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1313,7 +1313,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1327,7 +1327,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1341,7 +1341,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1355,7 +1355,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendLogin.csharp.md b/docs/approleAuthBackendLogin.csharp.md index 33dda5c6..321c98db 100644 --- a/docs/approleAuthBackendLogin.csharp.md +++ b/docs/approleAuthBackendLogin.csharp.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -913,7 +913,7 @@ new ApproleAuthBackendLoginConfig { | Provisioners | object[] | *No description.* | | RoleId | string | The RoleID to log in with. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretId | string | The SecretID to log in with. | @@ -999,7 +999,7 @@ public string RoleId { get; set; } The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1013,7 +1013,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1025,7 +1025,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1042,7 +1042,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1056,7 +1056,7 @@ public string SecretId { get; set; } The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendLogin.go.md b/docs/approleAuthBackendLogin.go.md index 5776949c..16ce4823 100644 --- a/docs/approleAuthBackendLogin.go.md +++ b/docs/approleAuthBackendLogin.go.md @@ -4,12 +4,12 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendlogin" approleauthbackendlogin.NewApproleAuthBackendLogin(scope Construct, id *string, config ApproleAuthBackendLoginConfig) ApproleAuthBackendLogin ``` @@ -406,7 +406,7 @@ func ResetSecretId() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendlogin" approleauthbackendlogin.ApproleAuthBackendLogin_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendlogin" approleauthbackendlogin.ApproleAuthBackendLogin_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ approleauthbackendlogin.ApproleAuthBackendLogin_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendlogin" approleauthbackendlogin.ApproleAuthBackendLogin_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ approleauthbackendlogin.ApproleAuthBackendLogin_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendlogin" approleauthbackendlogin.ApproleAuthBackendLogin_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -882,7 +882,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendlogin" &approleauthbackendlogin.ApproleAuthBackendLoginConfig { Connection: interface{}, @@ -913,7 +913,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendlog | Provisioners | *[]interface{} | *No description.* | | RoleId | *string | The RoleID to log in with. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretId | *string | The SecretID to log in with. | @@ -999,7 +999,7 @@ RoleId *string The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1013,7 +1013,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1025,7 +1025,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1042,7 +1042,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1056,7 +1056,7 @@ SecretId *string The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendLogin.java.md b/docs/approleAuthBackendLogin.java.md index ac51d038..fbee83bf 100644 --- a/docs/approleAuthBackendLogin.java.md +++ b/docs/approleAuthBackendLogin.java.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers @@ -44,7 +44,7 @@ ApproleAuthBackendLogin.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | roleId | java.lang.String | The RoleID to log in with. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretId | java.lang.String | The SecretID to log in with. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1034,7 +1034,7 @@ ApproleAuthBackendLoginConfig.builder() | provisioners | java.util.List | *No description.* | | roleId | java.lang.String | The RoleID to log in with. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretId | java.lang.String | The SecretID to log in with. | @@ -1120,7 +1120,7 @@ public java.lang.String getRoleId(); The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1134,7 +1134,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1146,7 +1146,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1163,7 +1163,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1177,7 +1177,7 @@ public java.lang.String getSecretId(); The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendLogin.python.md b/docs/approleAuthBackendLogin.python.md index 8f9aacb1..50c8082e 100644 --- a/docs/approleAuthBackendLogin.python.md +++ b/docs/approleAuthBackendLogin.python.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers @@ -42,7 +42,7 @@ approleAuthBackendLogin.ApproleAuthBackendLogin( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_id | str | The RoleID to log in with. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_id | str | The SecretID to log in with. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1074,7 +1074,7 @@ approleAuthBackendLogin.ApproleAuthBackendLoginConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_id | str | The RoleID to log in with. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_id | str | The SecretID to log in with. | @@ -1160,7 +1160,7 @@ role_id: str The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1174,7 +1174,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1186,7 +1186,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1203,7 +1203,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1217,7 +1217,7 @@ secret_id: str The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendLogin.typescript.md b/docs/approleAuthBackendLogin.typescript.md index a93a68c9..79e60016 100644 --- a/docs/approleAuthBackendLogin.typescript.md +++ b/docs/approleAuthBackendLogin.typescript.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -900,7 +900,7 @@ const approleAuthBackendLoginConfig: approleAuthBackendLogin.ApproleAuthBackendL | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | roleId | string | The RoleID to log in with. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | string | Target namespace. (requires Enterprise). | | secretId | string | The SecretID to log in with. | @@ -986,7 +986,7 @@ public readonly roleId: string; The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1000,7 +1000,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1012,7 +1012,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1029,7 +1029,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1043,7 +1043,7 @@ public readonly secretId: string; The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendRole.csharp.md b/docs/approleAuthBackendRole.csharp.md index b270762f..021e9223 100644 --- a/docs/approleAuthBackendRole.csharp.md +++ b/docs/approleAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers @@ -586,7 +586,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1227,7 +1227,7 @@ new ApproleAuthBackendRoleConfig { | RoleName | string | Name of the role. | | Backend | string | Unique name of the auth backend to configure. | | BindSecretId | object | Whether or not to require secret_id to be present when logging in using this AppRole. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | RoleId | string | The RoleID of the role. Autogenerated if not set. | | SecretIdBoundCidrs | string[] | List of CIDR blocks that can log in using the AppRole. | @@ -1325,7 +1325,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1339,7 +1339,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1353,7 +1353,7 @@ public object BindSecretId { get; set; } Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1365,7 +1365,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1382,7 +1382,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1396,7 +1396,7 @@ public string RoleId { get; set; } The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1410,7 +1410,7 @@ public string[] SecretIdBoundCidrs { get; set; } List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1426,7 +1426,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1440,7 +1440,7 @@ public double SecretIdTtl { get; set; } Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1454,7 +1454,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1468,7 +1468,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1482,7 +1482,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1496,7 +1496,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1510,7 +1510,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1524,7 +1524,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1538,7 +1538,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1552,7 +1552,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1566,7 +1566,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRole.go.md b/docs/approleAuthBackendRole.go.md index 8c435687..9c7f6f20 100644 --- a/docs/approleAuthBackendRole.go.md +++ b/docs/approleAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrole" approleauthbackendrole.NewApproleAuthBackendRole(scope Construct, id *string, config ApproleAuthBackendRoleConfig) ApproleAuthBackendRole ``` @@ -497,7 +497,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrole" approleauthbackendrole.ApproleAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -529,7 +529,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrole" approleauthbackendrole.ApproleAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -543,7 +543,7 @@ approleauthbackendrole.ApproleAuthBackendRole_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrole" approleauthbackendrole.ApproleAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -557,7 +557,7 @@ approleauthbackendrole.ApproleAuthBackendRole_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrole" approleauthbackendrole.ApproleAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -586,7 +586,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1182,7 +1182,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrole" &approleauthbackendrole.ApproleAuthBackendRoleConfig { Connection: interface{}, @@ -1227,7 +1227,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrol | RoleName | *string | Name of the role. | | Backend | *string | Unique name of the auth backend to configure. | | BindSecretId | interface{} | Whether or not to require secret_id to be present when logging in using this AppRole. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | RoleId | *string | The RoleID of the role. Autogenerated if not set. | | SecretIdBoundCidrs | *[]*string | List of CIDR blocks that can log in using the AppRole. | @@ -1325,7 +1325,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1339,7 +1339,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1353,7 +1353,7 @@ BindSecretId interface{} Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1365,7 +1365,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1382,7 +1382,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1396,7 +1396,7 @@ RoleId *string The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1410,7 +1410,7 @@ SecretIdBoundCidrs *[]*string List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1426,7 +1426,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1440,7 +1440,7 @@ SecretIdTtl *f64 Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1454,7 +1454,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1468,7 +1468,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1482,7 +1482,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1496,7 +1496,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1510,7 +1510,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1524,7 +1524,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1538,7 +1538,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1552,7 +1552,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1566,7 +1566,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRole.java.md b/docs/approleAuthBackendRole.java.md index 03530730..de153a3a 100644 --- a/docs/approleAuthBackendRole.java.md +++ b/docs/approleAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers @@ -60,7 +60,7 @@ ApproleAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | | bindSecretId | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | roleId | java.lang.String | The RoleID of the role. Autogenerated if not set. | | secretIdBoundCidrs | java.util.List | List of CIDR blocks that can log in using the AppRole. | @@ -144,7 +144,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -185,7 +185,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -217,7 +217,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -307,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -317,7 +317,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- @@ -863,7 +863,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1510,7 +1510,7 @@ ApproleAuthBackendRoleConfig.builder() | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | | bindSecretId | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | roleId | java.lang.String | The RoleID of the role. Autogenerated if not set. | | secretIdBoundCidrs | java.util.List | List of CIDR blocks that can log in using the AppRole. | @@ -1608,7 +1608,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1622,7 +1622,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1636,7 +1636,7 @@ public java.lang.Object getBindSecretId(); Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1648,7 +1648,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1665,7 +1665,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1679,7 +1679,7 @@ public java.lang.String getRoleId(); The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1693,7 +1693,7 @@ public java.util.List getSecretIdBoundCidrs(); List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1709,7 +1709,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1723,7 +1723,7 @@ public java.lang.Number getSecretIdTtl(); Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1737,7 +1737,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1751,7 +1751,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1765,7 +1765,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1779,7 +1779,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1793,7 +1793,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1807,7 +1807,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1821,7 +1821,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1835,7 +1835,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1849,7 +1849,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRole.python.md b/docs/approleAuthBackendRole.python.md index 43028755..e9e9a8fd 100644 --- a/docs/approleAuthBackendRole.python.md +++ b/docs/approleAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers @@ -56,7 +56,7 @@ approleAuthBackendRole.ApproleAuthBackendRole( | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | | bind_secret_id | typing.Union[bool, cdktf.IResolvable] | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | role_id | str | The RoleID of the role. Autogenerated if not set. | | secret_id_bound_cidrs | typing.List[str] | List of CIDR blocks that can log in using the AppRole. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -213,7 +213,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- @@ -905,7 +905,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1546,7 +1546,7 @@ approleAuthBackendRole.ApproleAuthBackendRoleConfig( | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | | bind_secret_id | typing.Union[bool, cdktf.IResolvable] | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | role_id | str | The RoleID of the role. Autogenerated if not set. | | secret_id_bound_cidrs | typing.List[str] | List of CIDR blocks that can log in using the AppRole. | @@ -1644,7 +1644,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1658,7 +1658,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1672,7 +1672,7 @@ bind_secret_id: typing.Union[bool, IResolvable] Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1684,7 +1684,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1701,7 +1701,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1715,7 +1715,7 @@ role_id: str The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1729,7 +1729,7 @@ secret_id_bound_cidrs: typing.List[str] List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1745,7 +1745,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1759,7 +1759,7 @@ secret_id_ttl: typing.Union[int, float] Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1773,7 +1773,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1787,7 +1787,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1801,7 +1801,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1815,7 +1815,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1829,7 +1829,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1843,7 +1843,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1857,7 +1857,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1871,7 +1871,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1885,7 +1885,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRole.typescript.md b/docs/approleAuthBackendRole.typescript.md index bc95680f..1b411c91 100644 --- a/docs/approleAuthBackendRole.typescript.md +++ b/docs/approleAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers @@ -586,7 +586,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1201,7 +1201,7 @@ const approleAuthBackendRoleConfig: approleAuthBackendRole.ApproleAuthBackendRol | roleName | string | Name of the role. | | backend | string | Unique name of the auth backend to configure. | | bindSecretId | boolean \| cdktf.IResolvable | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | roleId | string | The RoleID of the role. Autogenerated if not set. | | secretIdBoundCidrs | string[] | List of CIDR blocks that can log in using the AppRole. | @@ -1299,7 +1299,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1313,7 +1313,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1327,7 +1327,7 @@ public readonly bindSecretId: boolean | IResolvable; Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1339,7 +1339,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1356,7 +1356,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1370,7 +1370,7 @@ public readonly roleId: string; The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1384,7 +1384,7 @@ public readonly secretIdBoundCidrs: string[]; List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1400,7 +1400,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1414,7 +1414,7 @@ public readonly secretIdTtl: number; Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1428,7 +1428,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1442,7 +1442,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1456,7 +1456,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1470,7 +1470,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1484,7 +1484,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1498,7 +1498,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1512,7 +1512,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1526,7 +1526,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1540,7 +1540,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRoleSecretId.csharp.md b/docs/approleAuthBackendRoleSecretId.csharp.md index 0a3cfc90..c48b933b 100644 --- a/docs/approleAuthBackendRoleSecretId.csharp.md +++ b/docs/approleAuthBackendRoleSecretId.csharp.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -990,7 +990,7 @@ new ApproleAuthBackendRoleSecretIdConfig { | RoleName | string | Name of the role. | | Backend | string | Unique name of the auth backend to configure. | | CidrList | string[] | List of CIDR blocks that can log in using the SecretID. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | Metadata | string | JSON-encoded secret data to write. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretId | string | The SecretID to be managed. If not specified, Vault auto-generates one. | @@ -1079,7 +1079,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1093,7 +1093,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1107,7 +1107,7 @@ public string[] CidrList { get; set; } List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1119,7 +1119,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ public string Metadata { get; set; } JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1150,7 +1150,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} --- @@ -1164,7 +1164,7 @@ public string SecretId { get; set; } The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} --- @@ -1180,7 +1180,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1194,7 +1194,7 @@ public string WrappingTtl { get; set; } The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/approleAuthBackendRoleSecretId.go.md b/docs/approleAuthBackendRoleSecretId.go.md index b74bd8d4..f68c54d8 100644 --- a/docs/approleAuthBackendRoleSecretId.go.md +++ b/docs/approleAuthBackendRoleSecretId.go.md @@ -4,12 +4,12 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrolesecretid" approleauthbackendrolesecretid.NewApproleAuthBackendRoleSecretId(scope Construct, id *string, config ApproleAuthBackendRoleSecretIdConfig) ApproleAuthBackendRoleSecretId ``` @@ -434,7 +434,7 @@ func ResetWrappingTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrolesecretid" approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsConstruct(x interface{}) *bool ``` @@ -466,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrolesecretid" approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +480,7 @@ approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsTerraformElement ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrolesecretid" approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +494,7 @@ approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_IsTerraformResourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrolesecretid" approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretId_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -523,7 +523,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -954,7 +954,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrolesecretid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrolesecretid" &approleauthbackendrolesecretid.ApproleAuthBackendRoleSecretIdConfig { Connection: interface{}, @@ -990,7 +990,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/approleauthbackendrol | RoleName | *string | Name of the role. | | Backend | *string | Unique name of the auth backend to configure. | | CidrList | *[]*string | List of CIDR blocks that can log in using the SecretID. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | Metadata | *string | JSON-encoded secret data to write. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretId | *string | The SecretID to be managed. If not specified, Vault auto-generates one. | @@ -1079,7 +1079,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1093,7 +1093,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1107,7 +1107,7 @@ CidrList *[]*string List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1119,7 +1119,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ Metadata *string JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1150,7 +1150,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} --- @@ -1164,7 +1164,7 @@ SecretId *string The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} --- @@ -1180,7 +1180,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1194,7 +1194,7 @@ WrappingTtl *string The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/approleAuthBackendRoleSecretId.java.md b/docs/approleAuthBackendRoleSecretId.java.md index a413da5b..68c6ab74 100644 --- a/docs/approleAuthBackendRoleSecretId.java.md +++ b/docs/approleAuthBackendRoleSecretId.java.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers @@ -50,7 +50,7 @@ ApproleAuthBackendRoleSecretId.Builder.create(Construct scope, java.lang.String | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | | cidrList | java.util.List | List of CIDR blocks that can log in using the SecretID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | java.lang.String | JSON-encoded secret data to write. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretId | java.lang.String | The SecretID to be managed. If not specified, Vault auto-generates one. | @@ -125,7 +125,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -166,7 +166,7 @@ If you experience problems setting this value it might not be settable. Please t JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} --- @@ -198,7 +198,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- @@ -691,7 +691,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -1163,7 +1163,7 @@ ApproleAuthBackendRoleSecretIdConfig.builder() | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | | cidrList | java.util.List | List of CIDR blocks that can log in using the SecretID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | java.lang.String | JSON-encoded secret data to write. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretId | java.lang.String | The SecretID to be managed. If not specified, Vault auto-generates one. | @@ -1252,7 +1252,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1266,7 +1266,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1280,7 +1280,7 @@ public java.util.List getCidrList(); List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1292,7 +1292,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1309,7 +1309,7 @@ public java.lang.String getMetadata(); JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1323,7 +1323,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} --- @@ -1337,7 +1337,7 @@ public java.lang.String getSecretId(); The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} --- @@ -1353,7 +1353,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1367,7 +1367,7 @@ public java.lang.String getWrappingTtl(); The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/approleAuthBackendRoleSecretId.python.md b/docs/approleAuthBackendRoleSecretId.python.md index f3c68ae3..a147ef3c 100644 --- a/docs/approleAuthBackendRoleSecretId.python.md +++ b/docs/approleAuthBackendRoleSecretId.python.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers @@ -47,7 +47,7 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretId( | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | | cidr_list | typing.List[str] | List of CIDR blocks that can log in using the SecretID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | str | JSON-encoded secret data to write. | | namespace | str | Target namespace. (requires Enterprise). | | secret_id | str | The SecretID to be managed. If not specified, Vault auto-generates one. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ If you experience problems setting this value it might not be settable. Please t JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} --- @@ -195,7 +195,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- @@ -734,7 +734,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -1201,7 +1201,7 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretIdConfig( | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | | cidr_list | typing.List[str] | List of CIDR blocks that can log in using the SecretID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | str | JSON-encoded secret data to write. | | namespace | str | Target namespace. (requires Enterprise). | | secret_id | str | The SecretID to be managed. If not specified, Vault auto-generates one. | @@ -1290,7 +1290,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1304,7 +1304,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1318,7 +1318,7 @@ cidr_list: typing.List[str] List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1330,7 +1330,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1347,7 +1347,7 @@ metadata: str JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1361,7 +1361,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} --- @@ -1375,7 +1375,7 @@ secret_id: str The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} --- @@ -1391,7 +1391,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1405,7 +1405,7 @@ wrapping_ttl: str The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/approleAuthBackendRoleSecretId.typescript.md b/docs/approleAuthBackendRoleSecretId.typescript.md index 6601ce2b..538e68cd 100644 --- a/docs/approleAuthBackendRoleSecretId.typescript.md +++ b/docs/approleAuthBackendRoleSecretId.typescript.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -973,7 +973,7 @@ const approleAuthBackendRoleSecretIdConfig: approleAuthBackendRoleSecretId.Appro | roleName | string | Name of the role. | | backend | string | Unique name of the auth backend to configure. | | cidrList | string[] | List of CIDR blocks that can log in using the SecretID. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | string | JSON-encoded secret data to write. | | namespace | string | Target namespace. (requires Enterprise). | | secretId | string | The SecretID to be managed. If not specified, Vault auto-generates one. | @@ -1062,7 +1062,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1076,7 +1076,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1090,7 +1090,7 @@ public readonly cidrList: string[]; List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1102,7 +1102,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1119,7 +1119,7 @@ public readonly metadata: string; JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1133,7 +1133,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} --- @@ -1147,7 +1147,7 @@ public readonly secretId: string; The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} --- @@ -1163,7 +1163,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1177,7 +1177,7 @@ public readonly wrappingTtl: string; The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/audit.csharp.md b/docs/audit.csharp.md index 09f9bd13..14342960 100644 --- a/docs/audit.csharp.md +++ b/docs/audit.csharp.md @@ -4,7 +4,7 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit vault_audit}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -890,7 +890,7 @@ new AuditConfig { | Options | System.Collections.Generic.IDictionary | Configuration options to pass to the audit device itself. | | Type | string | Type of the audit device, such as 'file'. | | Description | string | Human-friendly description of the audit device. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. | | Local | object | Specifies if the audit device is a local only. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | Path in which to enable the audit device. | @@ -977,7 +977,7 @@ public System.Collections.Generic.IDictionary Options { get; set Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#options Audit#options} --- @@ -991,7 +991,7 @@ public string Type { get; set; } Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#type Audit#type} --- @@ -1005,7 +1005,7 @@ public string Description { get; set; } Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#description Audit#description} --- @@ -1017,7 +1017,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#local Audit#local} --- @@ -1050,7 +1050,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1064,7 +1064,7 @@ public string Path { get; set; } Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/audit.go.md b/docs/audit.go.md index fd7d3923..7ed35bc1 100644 --- a/docs/audit.go.md +++ b/docs/audit.go.md @@ -4,12 +4,12 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit vault_audit}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/audit" audit.NewAudit(scope Construct, id *string, config AuditConfig) Audit ``` @@ -413,7 +413,7 @@ func ResetPath() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/audit" audit.Audit_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/audit" audit.Audit_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ audit.Audit_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/audit" audit.Audit_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ audit.Audit_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/audit" audit.Audit_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -856,7 +856,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/audit" &audit.AuditConfig { Connection: interface{}, @@ -890,7 +890,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/audit" | Options | *map[string]*string | Configuration options to pass to the audit device itself. | | Type | *string | Type of the audit device, such as 'file'. | | Description | *string | Human-friendly description of the audit device. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. | | Local | interface{} | Specifies if the audit device is a local only. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | Path in which to enable the audit device. | @@ -977,7 +977,7 @@ Options *map[string]*string Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#options Audit#options} --- @@ -991,7 +991,7 @@ Type *string Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#type Audit#type} --- @@ -1005,7 +1005,7 @@ Description *string Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#description Audit#description} --- @@ -1017,7 +1017,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#local Audit#local} --- @@ -1050,7 +1050,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1064,7 +1064,7 @@ Path *string Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/audit.java.md b/docs/audit.java.md index f8e9d47f..cd7ecac3 100644 --- a/docs/audit.java.md +++ b/docs/audit.java.md @@ -4,7 +4,7 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit vault_audit}. #### Initializers @@ -48,7 +48,7 @@ Audit.Builder.create(Construct scope, java.lang.String id) | options | java.util.Map | Configuration options to pass to the audit device itself. | | type | java.lang.String | Type of the audit device, such as 'file'. | | description | java.lang.String | Human-friendly description of the audit device. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the audit device is a local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path in which to enable the audit device. | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#options Audit#options} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#type Audit#type} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#description Audit#description} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -164,7 +164,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#local Audit#local} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#namespace Audit#namespace} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#path Audit#path} --- @@ -646,7 +646,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -1039,7 +1039,7 @@ AuditConfig.builder() | options | java.util.Map | Configuration options to pass to the audit device itself. | | type | java.lang.String | Type of the audit device, such as 'file'. | | description | java.lang.String | Human-friendly description of the audit device. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the audit device is a local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path in which to enable the audit device. | @@ -1126,7 +1126,7 @@ public java.util.Map getOptions(); Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#options Audit#options} --- @@ -1140,7 +1140,7 @@ public java.lang.String getType(); Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#type Audit#type} --- @@ -1154,7 +1154,7 @@ public java.lang.String getDescription(); Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#description Audit#description} --- @@ -1166,7 +1166,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1185,7 +1185,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#local Audit#local} --- @@ -1199,7 +1199,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1213,7 +1213,7 @@ public java.lang.String getPath(); Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/audit.python.md b/docs/audit.python.md index 517c6724..bec7dbdf 100644 --- a/docs/audit.python.md +++ b/docs/audit.python.md @@ -4,7 +4,7 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit vault_audit}. #### Initializers @@ -45,7 +45,7 @@ audit.Audit( | options | typing.Mapping[str] | Configuration options to pass to the audit device itself. | | type | str | Type of the audit device, such as 'file'. | | description | str | Human-friendly description of the audit device. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the audit device is a local only. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path in which to enable the audit device. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#options Audit#options} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#type Audit#type} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#description Audit#description} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#local Audit#local} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#namespace Audit#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#path Audit#path} --- @@ -689,7 +689,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -1077,7 +1077,7 @@ audit.AuditConfig( | options | typing.Mapping[str] | Configuration options to pass to the audit device itself. | | type | str | Type of the audit device, such as 'file'. | | description | str | Human-friendly description of the audit device. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the audit device is a local only. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path in which to enable the audit device. | @@ -1164,7 +1164,7 @@ options: typing.Mapping[str] Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#options Audit#options} --- @@ -1178,7 +1178,7 @@ type: str Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#type Audit#type} --- @@ -1192,7 +1192,7 @@ description: str Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#description Audit#description} --- @@ -1204,7 +1204,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1223,7 +1223,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#local Audit#local} --- @@ -1237,7 +1237,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1251,7 +1251,7 @@ path: str Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/audit.typescript.md b/docs/audit.typescript.md index 4633878d..a869d5f4 100644 --- a/docs/audit.typescript.md +++ b/docs/audit.typescript.md @@ -4,7 +4,7 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit vault_audit}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ const auditConfig: audit.AuditConfig = { ... } | options | {[ key: string ]: string} | Configuration options to pass to the audit device itself. | | type | string | Type of the audit device, such as 'file'. | | description | string | Human-friendly description of the audit device. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. | | local | boolean \| cdktf.IResolvable | Specifies if the audit device is a local only. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | Path in which to enable the audit device. | @@ -962,7 +962,7 @@ public readonly options: {[ key: string ]: string}; Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#options Audit#options} --- @@ -976,7 +976,7 @@ public readonly type: string; Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#type Audit#type} --- @@ -990,7 +990,7 @@ public readonly description: string; Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#description Audit#description} --- @@ -1002,7 +1002,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1021,7 +1021,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#local Audit#local} --- @@ -1035,7 +1035,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1049,7 +1049,7 @@ public readonly path: string; Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/auditRequestHeader.csharp.md b/docs/auditRequestHeader.csharp.md index 728b8a5c..8ca95496 100644 --- a/docs/auditRequestHeader.csharp.md +++ b/docs/auditRequestHeader.csharp.md @@ -4,7 +4,7 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -806,7 +806,7 @@ new AuditRequestHeaderConfig { | Provisioners | object[] | *No description.* | | Name | string | The name of the request header to audit. | | Hmac | object | Whether this header's value should be HMAC'd in the audit logs. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -891,7 +891,7 @@ public string Name { get; set; } The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -905,7 +905,7 @@ public object Hmac { get; set; } Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -917,7 +917,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -934,7 +934,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/auditRequestHeader.go.md b/docs/auditRequestHeader.go.md index 1aeeb054..ad76fdcb 100644 --- a/docs/auditRequestHeader.go.md +++ b/docs/auditRequestHeader.go.md @@ -4,12 +4,12 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/auditrequestheader" auditrequestheader.NewAuditRequestHeader(scope Construct, id *string, config AuditRequestHeaderConfig) AuditRequestHeader ``` @@ -399,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/auditrequestheader" auditrequestheader.AuditRequestHeader_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/auditrequestheader" auditrequestheader.AuditRequestHeader_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ auditrequestheader.AuditRequestHeader_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/auditrequestheader" auditrequestheader.AuditRequestHeader_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ auditrequestheader.AuditRequestHeader_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/auditrequestheader" auditrequestheader.AuditRequestHeader_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -776,7 +776,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/auditrequestheader" &auditrequestheader.AuditRequestHeaderConfig { Connection: interface{}, @@ -806,7 +806,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/auditrequestheader" | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the request header to audit. | | Hmac | interface{} | Whether this header's value should be HMAC'd in the audit logs. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -891,7 +891,7 @@ Name *string The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -905,7 +905,7 @@ Hmac interface{} Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -917,7 +917,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -934,7 +934,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/auditRequestHeader.java.md b/docs/auditRequestHeader.java.md index d038bac0..4b83c54f 100644 --- a/docs/auditRequestHeader.java.md +++ b/docs/auditRequestHeader.java.md @@ -4,7 +4,7 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers @@ -44,7 +44,7 @@ AuditRequestHeader.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the request header to audit. | | hmac | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether this header's value should be HMAC'd in the audit logs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -115,7 +115,7 @@ Must be unique amongst siblings in the same scope The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -125,7 +125,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -146,7 +146,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- @@ -594,7 +594,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -917,7 +917,7 @@ AuditRequestHeaderConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the request header to audit. | | hmac | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether this header's value should be HMAC'd in the audit logs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1002,7 +1002,7 @@ public java.lang.String getName(); The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -1016,7 +1016,7 @@ public java.lang.Object getHmac(); Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -1028,7 +1028,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1045,7 +1045,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/auditRequestHeader.python.md b/docs/auditRequestHeader.python.md index 92353a6f..01bfe240 100644 --- a/docs/auditRequestHeader.python.md +++ b/docs/auditRequestHeader.python.md @@ -4,7 +4,7 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers @@ -41,7 +41,7 @@ auditRequestHeader.AuditRequestHeader( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the request header to audit. | | hmac | typing.Union[bool, cdktf.IResolvable] | Whether this header's value should be HMAC'd in the audit logs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- @@ -637,7 +637,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -955,7 +955,7 @@ auditRequestHeader.AuditRequestHeaderConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the request header to audit. | | hmac | typing.Union[bool, cdktf.IResolvable] | Whether this header's value should be HMAC'd in the audit logs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1040,7 +1040,7 @@ name: str The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -1054,7 +1054,7 @@ hmac: typing.Union[bool, IResolvable] Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -1066,7 +1066,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1083,7 +1083,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/auditRequestHeader.typescript.md b/docs/auditRequestHeader.typescript.md index 5aa189a2..18e6eae0 100644 --- a/docs/auditRequestHeader.typescript.md +++ b/docs/auditRequestHeader.typescript.md @@ -4,7 +4,7 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -794,7 +794,7 @@ const auditRequestHeaderConfig: auditRequestHeader.AuditRequestHeaderConfig = { | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the request header to audit. | | hmac | boolean \| cdktf.IResolvable | Whether this header's value should be HMAC'd in the audit logs. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -879,7 +879,7 @@ public readonly name: string; The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -893,7 +893,7 @@ public readonly hmac: boolean | IResolvable; Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -905,7 +905,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -922,7 +922,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/authBackend.csharp.md b/docs/authBackend.csharp.md index 604f1670..59e519ba 100644 --- a/docs/authBackend.csharp.md +++ b/docs/authBackend.csharp.md @@ -4,7 +4,7 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers @@ -529,7 +529,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -951,11 +951,11 @@ new AuthBackendConfig { | Type | string | Name of the auth backend. | | Description | string | The description of the auth backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. | | Local | object | Specifies if the auth method is local only. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | path to mount the backend. This defaults to the type. | -| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1039,7 +1039,7 @@ public string Type { get; set; } Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1053,7 +1053,7 @@ public string Description { get; set; } The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1067,7 +1067,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1079,7 +1079,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1096,7 +1096,7 @@ public object Local { get; set; } Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1110,7 +1110,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1124,7 +1124,7 @@ public string Path { get; set; } path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1136,7 +1136,7 @@ public object Tune { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1163,14 +1163,14 @@ new AuthBackendTune { | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1182,7 +1182,7 @@ public string[] AllowedResponseHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1194,7 +1194,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1206,7 +1206,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1218,7 +1218,7 @@ public string DefaultLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1230,7 +1230,7 @@ public string ListingVisibility { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1242,7 +1242,7 @@ public string MaxLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1254,7 +1254,7 @@ public string[] PassthroughRequestHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1266,7 +1266,7 @@ public string TokenType { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- diff --git a/docs/authBackend.go.md b/docs/authBackend.go.md index ecb1fa8f..a7c6a4ba 100644 --- a/docs/authBackend.go.md +++ b/docs/authBackend.go.md @@ -4,12 +4,12 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" authbackend.NewAuthBackend(scope Construct, id *string, config AuthBackendConfig) AuthBackend ``` @@ -440,7 +440,7 @@ func ResetTune() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" authbackend.AuthBackend_IsConstruct(x interface{}) *bool ``` @@ -472,7 +472,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" authbackend.AuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -486,7 +486,7 @@ authbackend.AuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" authbackend.AuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -500,7 +500,7 @@ authbackend.AuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" authbackend.AuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -529,7 +529,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -916,7 +916,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" &authbackend.AuthBackendConfig { Connection: interface{}, @@ -951,11 +951,11 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" | Type | *string | Name of the auth backend. | | Description | *string | The description of the auth backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. | | Local | interface{} | Specifies if the auth method is local only. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | path to mount the backend. This defaults to the type. | -| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1039,7 +1039,7 @@ Type *string Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1053,7 +1053,7 @@ Description *string The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1067,7 +1067,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1079,7 +1079,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1096,7 +1096,7 @@ Local interface{} Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1110,7 +1110,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1124,7 +1124,7 @@ Path *string path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1136,7 +1136,7 @@ Tune interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1145,7 +1145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" &authbackend.AuthBackendTune { AllowedResponseHeaders: *[]*string, @@ -1163,14 +1163,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1182,7 +1182,7 @@ AllowedResponseHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1194,7 +1194,7 @@ AuditNonHmacRequestKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1206,7 +1206,7 @@ AuditNonHmacResponseKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1218,7 +1218,7 @@ DefaultLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1230,7 +1230,7 @@ ListingVisibility *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1242,7 +1242,7 @@ MaxLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1254,7 +1254,7 @@ PassthroughRequestHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1266,7 +1266,7 @@ TokenType *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- @@ -1277,7 +1277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" authbackend.NewAuthBackendTuneList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) AuthBackendTuneList ``` @@ -1437,7 +1437,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/authbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" authbackend.NewAuthBackendTuneOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) AuthBackendTuneOutputReference ``` diff --git a/docs/authBackend.java.md b/docs/authBackend.java.md index 6470f3a2..41a22e23 100644 --- a/docs/authBackend.java.md +++ b/docs/authBackend.java.md @@ -4,7 +4,7 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers @@ -51,11 +51,11 @@ AuthBackend.Builder.create(Construct scope, java.lang.String id) | type | java.lang.String | Name of the auth backend. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | path to mount the backend. This defaults to the type. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -125,7 +125,7 @@ Must be unique amongst siblings in the same scope Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -166,7 +166,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -683,7 +683,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1112,11 +1112,11 @@ AuthBackendConfig.builder() | type | java.lang.String | Name of the auth backend. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | path to mount the backend. This defaults to the type. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1200,7 +1200,7 @@ public java.lang.String getType(); Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1214,7 +1214,7 @@ public java.lang.String getDescription(); The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1228,7 +1228,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1240,7 +1240,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1257,7 +1257,7 @@ public java.lang.Object getLocal(); Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1271,7 +1271,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1285,7 +1285,7 @@ public java.lang.String getPath(); path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1297,7 +1297,7 @@ public java.lang.Object getTune(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1324,14 +1324,14 @@ AuthBackendTune.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1343,7 +1343,7 @@ public java.util.List getAllowedResponseHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1355,7 +1355,7 @@ public java.util.List getAuditNonHmacRequestKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1367,7 +1367,7 @@ public java.util.List getAuditNonHmacResponseKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1379,7 +1379,7 @@ public java.lang.String getDefaultLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1391,7 +1391,7 @@ public java.lang.String getListingVisibility(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1403,7 +1403,7 @@ public java.lang.String getMaxLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1415,7 +1415,7 @@ public java.util.List getPassthroughRequestHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1427,7 +1427,7 @@ public java.lang.String getTokenType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- diff --git a/docs/authBackend.python.md b/docs/authBackend.python.md index 87033f81..ccfba6b4 100644 --- a/docs/authBackend.python.md +++ b/docs/authBackend.python.md @@ -4,7 +4,7 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers @@ -46,11 +46,11 @@ authBackend.AuthBackend( | type | str | Name of the auth backend. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | path to mount the backend. This defaults to the type. | -| tune | typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -726,7 +726,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1148,11 +1148,11 @@ authBackend.AuthBackendConfig( | type | str | Name of the auth backend. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | path to mount the backend. This defaults to the type. | -| tune | typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1236,7 +1236,7 @@ type: str Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1250,7 +1250,7 @@ description: str The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1264,7 +1264,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1276,7 +1276,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1293,7 +1293,7 @@ local: typing.Union[bool, IResolvable] Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1307,7 +1307,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1321,7 +1321,7 @@ path: str path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1333,7 +1333,7 @@ tune: typing.Union[IResolvable, typing.List[AuthBackendTune]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1360,14 +1360,14 @@ authBackend.AuthBackendTune( | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1379,7 +1379,7 @@ allowed_response_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1391,7 +1391,7 @@ audit_non_hmac_request_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1403,7 +1403,7 @@ audit_non_hmac_response_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1415,7 +1415,7 @@ default_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1427,7 +1427,7 @@ listing_visibility: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1439,7 +1439,7 @@ max_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1451,7 +1451,7 @@ passthrough_request_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1463,7 +1463,7 @@ token_type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- diff --git a/docs/authBackend.typescript.md b/docs/authBackend.typescript.md index ec99705d..6b6007b8 100644 --- a/docs/authBackend.typescript.md +++ b/docs/authBackend.typescript.md @@ -4,7 +4,7 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers @@ -529,7 +529,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -935,11 +935,11 @@ const authBackendConfig: authBackend.AuthBackendConfig = { ... } | type | string | Name of the auth backend. | | description | string | The description of the auth backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. | | local | boolean \| cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | path to mount the backend. This defaults to the type. | -| tune | cdktf.IResolvable \| AuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | cdktf.IResolvable \| AuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1023,7 +1023,7 @@ public readonly type: string; Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1037,7 +1037,7 @@ public readonly description: string; The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1051,7 +1051,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1063,7 +1063,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1080,7 +1080,7 @@ public readonly local: boolean | IResolvable; Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1094,7 +1094,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1108,7 +1108,7 @@ public readonly path: string; path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1120,7 +1120,7 @@ public readonly tune: IResolvable | AuthBackendTune[]; - *Type:* cdktf.IResolvable | AuthBackendTune[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1138,14 +1138,14 @@ const authBackendTune: authBackend.AuthBackendTune = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1157,7 +1157,7 @@ public readonly allowedResponseHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1169,7 +1169,7 @@ public readonly auditNonHmacRequestKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1181,7 +1181,7 @@ public readonly auditNonHmacResponseKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1193,7 +1193,7 @@ public readonly defaultLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1205,7 +1205,7 @@ public readonly listingVisibility: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1217,7 +1217,7 @@ public readonly maxLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1229,7 +1229,7 @@ public readonly passthroughRequestHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1241,7 +1241,7 @@ public readonly tokenType: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- diff --git a/docs/awsAuthBackendCert.csharp.md b/docs/awsAuthBackendCert.csharp.md index 847137bc..c791d8f6 100644 --- a/docs/awsAuthBackendCert.csharp.md +++ b/docs/awsAuthBackendCert.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -860,7 +860,7 @@ new AwsAuthBackendCertConfig { | AwsPublicCert | string | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | CertName | string | Name of the certificate to configure. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Type | string | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -946,7 +946,7 @@ public string AwsPublicCert { get; set; } Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -960,7 +960,7 @@ public string CertName { get; set; } Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -974,7 +974,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -986,7 +986,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1017,7 +1017,7 @@ public string Type { get; set; } The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendCert.go.md b/docs/awsAuthBackendCert.go.md index f9ccdd1e..9325ff68 100644 --- a/docs/awsAuthBackendCert.go.md +++ b/docs/awsAuthBackendCert.go.md @@ -4,12 +4,12 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendcert" awsauthbackendcert.NewAwsAuthBackendCert(scope Construct, id *string, config AwsAuthBackendCertConfig) AwsAuthBackendCert ``` @@ -406,7 +406,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendcert" awsauthbackendcert.AwsAuthBackendCert_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendcert" awsauthbackendcert.AwsAuthBackendCert_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ awsauthbackendcert.AwsAuthBackendCert_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendcert" awsauthbackendcert.AwsAuthBackendCert_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ awsauthbackendcert.AwsAuthBackendCert_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendcert" awsauthbackendcert.AwsAuthBackendCert_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -827,7 +827,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendcert" &awsauthbackendcert.AwsAuthBackendCertConfig { Connection: interface{}, @@ -860,7 +860,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendcert" | AwsPublicCert | *string | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | CertName | *string | Name of the certificate to configure. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Type | *string | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -946,7 +946,7 @@ AwsPublicCert *string Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -960,7 +960,7 @@ CertName *string Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -974,7 +974,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -986,7 +986,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1017,7 +1017,7 @@ Type *string The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendCert.java.md b/docs/awsAuthBackendCert.java.md index 65b7a483..5c586b82 100644 --- a/docs/awsAuthBackendCert.java.md +++ b/docs/awsAuthBackendCert.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers @@ -46,7 +46,7 @@ AwsAuthBackendCert.Builder.create(Construct scope, java.lang.String id) | awsPublicCert | java.lang.String | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | certName | java.lang.String | Name of the certificate to configure. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | type | java.lang.String | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- @@ -624,7 +624,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -993,7 +993,7 @@ AwsAuthBackendCertConfig.builder() | awsPublicCert | java.lang.String | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | certName | java.lang.String | Name of the certificate to configure. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | type | java.lang.String | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -1079,7 +1079,7 @@ public java.lang.String getAwsPublicCert(); Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -1093,7 +1093,7 @@ public java.lang.String getCertName(); Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -1107,7 +1107,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -1119,7 +1119,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1150,7 +1150,7 @@ public java.lang.String getType(); The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendCert.python.md b/docs/awsAuthBackendCert.python.md index d922c833..7a32294c 100644 --- a/docs/awsAuthBackendCert.python.md +++ b/docs/awsAuthBackendCert.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers @@ -44,7 +44,7 @@ awsAuthBackendCert.AwsAuthBackendCert( | aws_public_cert | str | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | cert_name | str | Name of the certificate to configure. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | str | Target namespace. (requires Enterprise). | | type | str | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- @@ -668,7 +668,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1033,7 +1033,7 @@ awsAuthBackendCert.AwsAuthBackendCertConfig( | aws_public_cert | str | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | cert_name | str | Name of the certificate to configure. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | str | Target namespace. (requires Enterprise). | | type | str | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -1119,7 +1119,7 @@ aws_public_cert: str Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -1133,7 +1133,7 @@ cert_name: str Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -1147,7 +1147,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -1159,7 +1159,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1176,7 +1176,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1190,7 +1190,7 @@ type: str The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendCert.typescript.md b/docs/awsAuthBackendCert.typescript.md index b3f87f00..994abb0c 100644 --- a/docs/awsAuthBackendCert.typescript.md +++ b/docs/awsAuthBackendCert.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -846,7 +846,7 @@ const awsAuthBackendCertConfig: awsAuthBackendCert.AwsAuthBackendCertConfig = { | awsPublicCert | string | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | certName | string | Name of the certificate to configure. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | string | Target namespace. (requires Enterprise). | | type | string | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -932,7 +932,7 @@ public readonly awsPublicCert: string; Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -946,7 +946,7 @@ public readonly certName: string; Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -960,7 +960,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -972,7 +972,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1003,7 +1003,7 @@ public readonly type: string; The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendClient.csharp.md b/docs/awsAuthBackendClient.csharp.md index e59d61b7..f9b721eb 100644 --- a/docs/awsAuthBackendClient.csharp.md +++ b/docs/awsAuthBackendClient.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -1026,7 +1026,7 @@ new AwsAuthBackendClientConfig { | Ec2Endpoint | string | URL to override the default generated endpoint for making AWS EC2 API calls. | | IamEndpoint | string | URL to override the default generated endpoint for making AWS IAM API calls. | | IamServerIdHeaderValue | string | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretKey | string | AWS Secret key with permissions to query AWS APIs. | | StsEndpoint | string | URL to override the default generated endpoint for making AWS STS API calls. | @@ -1115,7 +1115,7 @@ public string AccessKey { get; set; } AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1129,7 +1129,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1143,7 +1143,7 @@ public string Ec2Endpoint { get; set; } URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1157,7 +1157,7 @@ public string IamEndpoint { get; set; } URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1171,7 +1171,7 @@ public string IamServerIdHeaderValue { get; set; } The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1183,7 +1183,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1200,7 +1200,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1214,7 +1214,7 @@ public string SecretKey { get; set; } AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1228,7 +1228,7 @@ public string StsEndpoint { get; set; } URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1242,7 +1242,7 @@ public string StsRegion { get; set; } Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1256,7 +1256,7 @@ public object UseStsRegionFromClient { get; set; } If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendClient.go.md b/docs/awsAuthBackendClient.go.md index 3ef3a8c3..12a6eca0 100644 --- a/docs/awsAuthBackendClient.go.md +++ b/docs/awsAuthBackendClient.go.md @@ -4,12 +4,12 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendclient" awsauthbackendclient.NewAwsAuthBackendClient(scope Construct, id *string, config AwsAuthBackendClientConfig) AwsAuthBackendClient ``` @@ -455,7 +455,7 @@ func ResetUseStsRegionFromClient() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendclient" awsauthbackendclient.AwsAuthBackendClient_IsConstruct(x interface{}) *bool ``` @@ -487,7 +487,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendclient" awsauthbackendclient.AwsAuthBackendClient_IsTerraformElement(x interface{}) *bool ``` @@ -501,7 +501,7 @@ awsauthbackendclient.AwsAuthBackendClient_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendclient" awsauthbackendclient.AwsAuthBackendClient_IsTerraformResource(x interface{}) *bool ``` @@ -515,7 +515,7 @@ awsauthbackendclient.AwsAuthBackendClient_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendclient" awsauthbackendclient.AwsAuthBackendClient_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -544,7 +544,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -986,7 +986,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendclient" &awsauthbackendclient.AwsAuthBackendClientConfig { Connection: interface{}, @@ -1026,7 +1026,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendclient" | Ec2Endpoint | *string | URL to override the default generated endpoint for making AWS EC2 API calls. | | IamEndpoint | *string | URL to override the default generated endpoint for making AWS IAM API calls. | | IamServerIdHeaderValue | *string | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretKey | *string | AWS Secret key with permissions to query AWS APIs. | | StsEndpoint | *string | URL to override the default generated endpoint for making AWS STS API calls. | @@ -1115,7 +1115,7 @@ AccessKey *string AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1129,7 +1129,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1143,7 +1143,7 @@ Ec2Endpoint *string URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1157,7 +1157,7 @@ IamEndpoint *string URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1171,7 +1171,7 @@ IamServerIdHeaderValue *string The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1183,7 +1183,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1200,7 +1200,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1214,7 +1214,7 @@ SecretKey *string AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1228,7 +1228,7 @@ StsEndpoint *string URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1242,7 +1242,7 @@ StsRegion *string Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1256,7 +1256,7 @@ UseStsRegionFromClient interface{} If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendClient.java.md b/docs/awsAuthBackendClient.java.md index a1078fa6..b5e00612 100644 --- a/docs/awsAuthBackendClient.java.md +++ b/docs/awsAuthBackendClient.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers @@ -54,7 +54,7 @@ AwsAuthBackendClient.Builder.create(Construct scope, java.lang.String id) | ec2Endpoint | java.lang.String | URL to override the default generated endpoint for making AWS EC2 API calls. | | iamEndpoint | java.lang.String | URL to override the default generated endpoint for making AWS IAM API calls. | | iamServerIdHeaderValue | java.lang.String | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretKey | java.lang.String | AWS Secret key with permissions to query AWS APIs. | | stsEndpoint | java.lang.String | URL to override the default generated endpoint for making AWS STS API calls. | @@ -129,7 +129,7 @@ Must be unique amongst siblings in the same scope AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -139,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -190,7 +190,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- @@ -734,7 +734,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -1221,7 +1221,7 @@ AwsAuthBackendClientConfig.builder() | ec2Endpoint | java.lang.String | URL to override the default generated endpoint for making AWS EC2 API calls. | | iamEndpoint | java.lang.String | URL to override the default generated endpoint for making AWS IAM API calls. | | iamServerIdHeaderValue | java.lang.String | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretKey | java.lang.String | AWS Secret key with permissions to query AWS APIs. | | stsEndpoint | java.lang.String | URL to override the default generated endpoint for making AWS STS API calls. | @@ -1310,7 +1310,7 @@ public java.lang.String getAccessKey(); AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1324,7 +1324,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1338,7 +1338,7 @@ public java.lang.String getEc2Endpoint(); URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1352,7 +1352,7 @@ public java.lang.String getIamEndpoint(); URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1366,7 +1366,7 @@ public java.lang.String getIamServerIdHeaderValue(); The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1378,7 +1378,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1395,7 +1395,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1409,7 +1409,7 @@ public java.lang.String getSecretKey(); AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1423,7 +1423,7 @@ public java.lang.String getStsEndpoint(); URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1437,7 +1437,7 @@ public java.lang.String getStsRegion(); Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1451,7 +1451,7 @@ public java.lang.Object getUseStsRegionFromClient(); If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendClient.python.md b/docs/awsAuthBackendClient.python.md index 9de6fbc9..f7f05bc4 100644 --- a/docs/awsAuthBackendClient.python.md +++ b/docs/awsAuthBackendClient.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers @@ -51,7 +51,7 @@ awsAuthBackendClient.AwsAuthBackendClient( | ec2_endpoint | str | URL to override the default generated endpoint for making AWS EC2 API calls. | | iam_endpoint | str | URL to override the default generated endpoint for making AWS IAM API calls. | | iam_server_id_header_value | str | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_key | str | AWS Secret key with permissions to query AWS APIs. | | sts_endpoint | str | URL to override the default generated endpoint for making AWS STS API calls. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- @@ -777,7 +777,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -1259,7 +1259,7 @@ awsAuthBackendClient.AwsAuthBackendClientConfig( | ec2_endpoint | str | URL to override the default generated endpoint for making AWS EC2 API calls. | | iam_endpoint | str | URL to override the default generated endpoint for making AWS IAM API calls. | | iam_server_id_header_value | str | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_key | str | AWS Secret key with permissions to query AWS APIs. | | sts_endpoint | str | URL to override the default generated endpoint for making AWS STS API calls. | @@ -1348,7 +1348,7 @@ access_key: str AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1362,7 +1362,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1376,7 +1376,7 @@ ec2_endpoint: str URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1390,7 +1390,7 @@ iam_endpoint: str URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1404,7 +1404,7 @@ iam_server_id_header_value: str The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1416,7 +1416,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1433,7 +1433,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1447,7 +1447,7 @@ secret_key: str AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1461,7 +1461,7 @@ sts_endpoint: str URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1475,7 +1475,7 @@ sts_region: str Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1489,7 +1489,7 @@ use_sts_region_from_client: typing.Union[bool, IResolvable] If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendClient.typescript.md b/docs/awsAuthBackendClient.typescript.md index 637aa436..518e9583 100644 --- a/docs/awsAuthBackendClient.typescript.md +++ b/docs/awsAuthBackendClient.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -1007,7 +1007,7 @@ const awsAuthBackendClientConfig: awsAuthBackendClient.AwsAuthBackendClientConfi | ec2Endpoint | string | URL to override the default generated endpoint for making AWS EC2 API calls. | | iamEndpoint | string | URL to override the default generated endpoint for making AWS IAM API calls. | | iamServerIdHeaderValue | string | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | namespace | string | Target namespace. (requires Enterprise). | | secretKey | string | AWS Secret key with permissions to query AWS APIs. | | stsEndpoint | string | URL to override the default generated endpoint for making AWS STS API calls. | @@ -1096,7 +1096,7 @@ public readonly accessKey: string; AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1110,7 +1110,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1124,7 +1124,7 @@ public readonly ec2Endpoint: string; URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1138,7 +1138,7 @@ public readonly iamEndpoint: string; URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1152,7 +1152,7 @@ public readonly iamServerIdHeaderValue: string; The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1164,7 +1164,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1181,7 +1181,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1195,7 +1195,7 @@ public readonly secretKey: string; AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1209,7 +1209,7 @@ public readonly stsEndpoint: string; URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1223,7 +1223,7 @@ public readonly stsRegion: string; Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1237,7 +1237,7 @@ public readonly useStsRegionFromClient: boolean | IResolvable; If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendConfigIdentity.csharp.md b/docs/awsAuthBackendConfigIdentity.csharp.md index 188d8423..eff8b4ca 100644 --- a/docs/awsAuthBackendConfigIdentity.csharp.md +++ b/docs/awsAuthBackendConfigIdentity.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -906,7 +906,7 @@ new AwsAuthBackendConfigIdentityConfig { | Ec2Metadata | string[] | The metadata to include on the token returned by the login endpoint. | | IamAlias | string | How to generate the identity alias when using the iam auth method. | | IamMetadata | string[] | The metadata to include on the token returned by the login endpoint. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -991,7 +991,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -1005,7 +1005,7 @@ public string Ec2Alias { get; set; } Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1019,7 +1019,7 @@ public string[] Ec2Metadata { get; set; } The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1033,7 +1033,7 @@ public string IamAlias { get; set; } How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1047,7 +1047,7 @@ public string[] IamMetadata { get; set; } The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1059,7 +1059,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendConfigIdentity.go.md b/docs/awsAuthBackendConfigIdentity.go.md index b57c0eeb..d9b05f89 100644 --- a/docs/awsAuthBackendConfigIdentity.go.md +++ b/docs/awsAuthBackendConfigIdentity.go.md @@ -4,12 +4,12 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendconfigidentity" awsauthbackendconfigidentity.NewAwsAuthBackendConfigIdentity(scope Construct, id *string, config AwsAuthBackendConfigIdentityConfig) AwsAuthBackendConfigIdentity ``` @@ -427,7 +427,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendconfigidentity" awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsConstruct(x interface{}) *bool ``` @@ -459,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendconfigidentity" awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +473,7 @@ awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsTerraformElement(x i ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendconfigidentity" awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +487,7 @@ awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_IsTerraformResource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendconfigidentity" awsauthbackendconfigidentity.AwsAuthBackendConfigIdentity_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -516,7 +516,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -870,7 +870,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigidentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendconfigidentity" &awsauthbackendconfigidentity.AwsAuthBackendConfigIdentityConfig { Connection: interface{}, @@ -906,7 +906,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendconfigi | Ec2Metadata | *[]*string | The metadata to include on the token returned by the login endpoint. | | IamAlias | *string | How to generate the identity alias when using the iam auth method. | | IamMetadata | *[]*string | The metadata to include on the token returned by the login endpoint. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -991,7 +991,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -1005,7 +1005,7 @@ Ec2Alias *string Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1019,7 +1019,7 @@ Ec2Metadata *[]*string The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1033,7 +1033,7 @@ IamAlias *string How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1047,7 +1047,7 @@ IamMetadata *[]*string The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1059,7 +1059,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendConfigIdentity.java.md b/docs/awsAuthBackendConfigIdentity.java.md index 9c2b1523..e2dd5f6f 100644 --- a/docs/awsAuthBackendConfigIdentity.java.md +++ b/docs/awsAuthBackendConfigIdentity.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers @@ -49,7 +49,7 @@ AwsAuthBackendConfigIdentity.Builder.create(Construct scope, java.lang.String id | ec2Metadata | java.util.List | The metadata to include on the token returned by the login endpoint. | | iamAlias | java.lang.String | How to generate the identity alias when using the iam auth method. | | iamMetadata | java.util.List | The metadata to include on the token returned by the login endpoint. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- @@ -657,7 +657,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -1051,7 +1051,7 @@ AwsAuthBackendConfigIdentityConfig.builder() | ec2Metadata | java.util.List | The metadata to include on the token returned by the login endpoint. | | iamAlias | java.lang.String | How to generate the identity alias when using the iam auth method. | | iamMetadata | java.util.List | The metadata to include on the token returned by the login endpoint. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1136,7 +1136,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -1150,7 +1150,7 @@ public java.lang.String getEc2Alias(); Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1164,7 +1164,7 @@ public java.util.List getEc2Metadata(); The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1178,7 +1178,7 @@ public java.lang.String getIamAlias(); How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1192,7 +1192,7 @@ public java.util.List getIamMetadata(); The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1204,7 +1204,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1221,7 +1221,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendConfigIdentity.python.md b/docs/awsAuthBackendConfigIdentity.python.md index abdf36d2..488ebe3e 100644 --- a/docs/awsAuthBackendConfigIdentity.python.md +++ b/docs/awsAuthBackendConfigIdentity.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers @@ -47,7 +47,7 @@ awsAuthBackendConfigIdentity.AwsAuthBackendConfigIdentity( | ec2_metadata | typing.List[str] | The metadata to include on the token returned by the login endpoint. | | iam_alias | str | How to generate the identity alias when using the iam auth method. | | iam_metadata | typing.List[str] | The metadata to include on the token returned by the login endpoint. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- @@ -701,7 +701,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -1091,7 +1091,7 @@ awsAuthBackendConfigIdentity.AwsAuthBackendConfigIdentityConfig( | ec2_metadata | typing.List[str] | The metadata to include on the token returned by the login endpoint. | | iam_alias | str | How to generate the identity alias when using the iam auth method. | | iam_metadata | typing.List[str] | The metadata to include on the token returned by the login endpoint. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1176,7 +1176,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -1190,7 +1190,7 @@ ec2_alias: str Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1204,7 +1204,7 @@ ec2_metadata: typing.List[str] The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1218,7 +1218,7 @@ iam_alias: str How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1232,7 +1232,7 @@ iam_metadata: typing.List[str] The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1244,7 +1244,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1261,7 +1261,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendConfigIdentity.typescript.md b/docs/awsAuthBackendConfigIdentity.typescript.md index 061a18cd..3487396e 100644 --- a/docs/awsAuthBackendConfigIdentity.typescript.md +++ b/docs/awsAuthBackendConfigIdentity.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -891,7 +891,7 @@ const awsAuthBackendConfigIdentityConfig: awsAuthBackendConfigIdentity.AwsAuthBa | ec2Metadata | string[] | The metadata to include on the token returned by the login endpoint. | | iamAlias | string | How to generate the identity alias when using the iam auth method. | | iamMetadata | string[] | The metadata to include on the token returned by the login endpoint. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -976,7 +976,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -990,7 +990,7 @@ public readonly ec2Alias: string; Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1004,7 +1004,7 @@ public readonly ec2Metadata: string[]; The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1018,7 +1018,7 @@ public readonly iamAlias: string; How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1032,7 +1032,7 @@ public readonly iamMetadata: string[]; The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1044,7 +1044,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1061,7 +1061,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.csharp.md b/docs/awsAuthBackendIdentityWhitelist.csharp.md index 3550fe0b..d74357a1 100644 --- a/docs/awsAuthBackendIdentityWhitelist.csharp.md +++ b/docs/awsAuthBackendIdentityWhitelist.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -843,7 +843,7 @@ new AwsAuthBackendIdentityWhitelistConfig { | Provisioners | object[] | *No description.* | | Backend | string | Unique name of the auth backend to configure. | | DisablePeriodicTidy | object | If true, disables the periodic tidying of the identiy whitelist entries. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SafetyBuffer | double | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -929,7 +929,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -943,7 +943,7 @@ public object DisablePeriodicTidy { get; set; } If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -955,7 +955,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -986,7 +986,7 @@ public double SafetyBuffer { get; set; } The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.go.md b/docs/awsAuthBackendIdentityWhitelist.go.md index c869de45..36cbee21 100644 --- a/docs/awsAuthBackendIdentityWhitelist.go.md +++ b/docs/awsAuthBackendIdentityWhitelist.go.md @@ -4,12 +4,12 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.NewAwsAuthBackendIdentityWhitelist(scope Construct, id *string, config AwsAuthBackendIdentityWhitelistConfig) AwsAuthBackendIdentityWhitelist ``` @@ -413,7 +413,7 @@ func ResetSafetyBuffer() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsTerraformEleme ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_IsTerraformResou ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendidentitywhitelist" awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelist_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -812,7 +812,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentitywhitelist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendidentitywhitelist" &awsauthbackendidentitywhitelist.AwsAuthBackendIdentityWhitelistConfig { Connection: interface{}, @@ -843,7 +843,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendidentit | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Unique name of the auth backend to configure. | | DisablePeriodicTidy | interface{} | If true, disables the periodic tidying of the identiy whitelist entries. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SafetyBuffer | *f64 | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -929,7 +929,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -943,7 +943,7 @@ DisablePeriodicTidy interface{} If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -955,7 +955,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -986,7 +986,7 @@ SafetyBuffer *f64 The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.java.md b/docs/awsAuthBackendIdentityWhitelist.java.md index 54f9df11..c6b68abe 100644 --- a/docs/awsAuthBackendIdentityWhitelist.java.md +++ b/docs/awsAuthBackendIdentityWhitelist.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers @@ -45,7 +45,7 @@ AwsAuthBackendIdentityWhitelist.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Unique name of the auth backend to configure. | | disablePeriodicTidy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | safetyBuffer | java.lang.Number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -148,7 +148,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- @@ -620,7 +620,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -966,7 +966,7 @@ AwsAuthBackendIdentityWhitelistConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Unique name of the auth backend to configure. | | disablePeriodicTidy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | safetyBuffer | java.lang.Number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -1052,7 +1052,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -1066,7 +1066,7 @@ public java.lang.Object getDisablePeriodicTidy(); If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -1078,7 +1078,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1095,7 +1095,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -1109,7 +1109,7 @@ public java.lang.Number getSafetyBuffer(); The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.python.md b/docs/awsAuthBackendIdentityWhitelist.python.md index 42799552..17928e81 100644 --- a/docs/awsAuthBackendIdentityWhitelist.python.md +++ b/docs/awsAuthBackendIdentityWhitelist.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers @@ -42,7 +42,7 @@ awsAuthBackendIdentityWhitelist.AwsAuthBackendIdentityWhitelist( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Unique name of the auth backend to configure. | | disable_periodic_tidy | typing.Union[bool, cdktf.IResolvable] | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | str | Target namespace. (requires Enterprise). | | safety_buffer | typing.Union[int, float] | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- @@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -1004,7 +1004,7 @@ awsAuthBackendIdentityWhitelist.AwsAuthBackendIdentityWhitelistConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Unique name of the auth backend to configure. | | disable_periodic_tidy | typing.Union[bool, cdktf.IResolvable] | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | str | Target namespace. (requires Enterprise). | | safety_buffer | typing.Union[int, float] | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -1090,7 +1090,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -1104,7 +1104,7 @@ disable_periodic_tidy: typing.Union[bool, IResolvable] If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -1116,7 +1116,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1133,7 +1133,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -1147,7 +1147,7 @@ safety_buffer: typing.Union[int, float] The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.typescript.md b/docs/awsAuthBackendIdentityWhitelist.typescript.md index 46fed5ce..ddb671d4 100644 --- a/docs/awsAuthBackendIdentityWhitelist.typescript.md +++ b/docs/awsAuthBackendIdentityWhitelist.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ const awsAuthBackendIdentityWhitelistConfig: awsAuthBackendIdentityWhitelist.Aws | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Unique name of the auth backend to configure. | | disablePeriodicTidy | boolean \| cdktf.IResolvable | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | string | Target namespace. (requires Enterprise). | | safetyBuffer | number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -916,7 +916,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -930,7 +930,7 @@ public readonly disablePeriodicTidy: boolean | IResolvable; If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -942,7 +942,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -959,7 +959,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -973,7 +973,7 @@ public readonly safetyBuffer: number; The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendLogin.csharp.md b/docs/awsAuthBackendLogin.csharp.md index d4883762..84f89551 100644 --- a/docs/awsAuthBackendLogin.csharp.md +++ b/docs/awsAuthBackendLogin.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1144,7 +1144,7 @@ new AwsAuthBackendLoginConfig { | IamRequestBody | string | The Base64-encoded body of the signed request. | | IamRequestHeaders | string | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | IamRequestUrl | string | The Base64-encoded HTTP URL used in the signed request. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | Identity | string | Base64-encoded EC2 instance identity document to authenticate with. | | Namespace | string | Target namespace. (requires Enterprise). | | Nonce | string | The nonce to be used for subsequent login requests. | @@ -1234,7 +1234,7 @@ public string Backend { get; set; } AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1248,7 +1248,7 @@ public string IamHttpRequestMethod { get; set; } The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1262,7 +1262,7 @@ public string IamRequestBody { get; set; } The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1276,7 +1276,7 @@ public string IamRequestHeaders { get; set; } The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1290,7 +1290,7 @@ public string IamRequestUrl { get; set; } The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1302,7 +1302,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1319,7 +1319,7 @@ public string Identity { get; set; } Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1333,7 +1333,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1347,7 +1347,7 @@ public string Nonce { get; set; } The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1361,7 +1361,7 @@ public string Pkcs7 { get; set; } PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1375,7 +1375,7 @@ public string Role { get; set; } AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1389,7 +1389,7 @@ public string Signature { get; set; } Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendLogin.go.md b/docs/awsAuthBackendLogin.go.md index 37b57086..a6a3c9da 100644 --- a/docs/awsAuthBackendLogin.go.md +++ b/docs/awsAuthBackendLogin.go.md @@ -4,12 +4,12 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendlogin" awsauthbackendlogin.NewAwsAuthBackendLogin(scope Construct, id *string, config AwsAuthBackendLoginConfig) AwsAuthBackendLogin ``` @@ -462,7 +462,7 @@ func ResetSignature() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendlogin" awsauthbackendlogin.AwsAuthBackendLogin_IsConstruct(x interface{}) *bool ``` @@ -494,7 +494,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendlogin" awsauthbackendlogin.AwsAuthBackendLogin_IsTerraformElement(x interface{}) *bool ``` @@ -508,7 +508,7 @@ awsauthbackendlogin.AwsAuthBackendLogin_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendlogin" awsauthbackendlogin.AwsAuthBackendLogin_IsTerraformResource(x interface{}) *bool ``` @@ -522,7 +522,7 @@ awsauthbackendlogin.AwsAuthBackendLogin_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendlogin" awsauthbackendlogin.AwsAuthBackendLogin_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -551,7 +551,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1103,7 +1103,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendlogin" &awsauthbackendlogin.AwsAuthBackendLoginConfig { Connection: interface{}, @@ -1144,7 +1144,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendlogin" | IamRequestBody | *string | The Base64-encoded body of the signed request. | | IamRequestHeaders | *string | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | IamRequestUrl | *string | The Base64-encoded HTTP URL used in the signed request. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | Identity | *string | Base64-encoded EC2 instance identity document to authenticate with. | | Namespace | *string | Target namespace. (requires Enterprise). | | Nonce | *string | The nonce to be used for subsequent login requests. | @@ -1234,7 +1234,7 @@ Backend *string AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1248,7 +1248,7 @@ IamHttpRequestMethod *string The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1262,7 +1262,7 @@ IamRequestBody *string The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1276,7 +1276,7 @@ IamRequestHeaders *string The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1290,7 +1290,7 @@ IamRequestUrl *string The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1302,7 +1302,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1319,7 +1319,7 @@ Identity *string Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1333,7 +1333,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1347,7 +1347,7 @@ Nonce *string The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1361,7 +1361,7 @@ Pkcs7 *string PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1375,7 +1375,7 @@ Role *string AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1389,7 +1389,7 @@ Signature *string Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendLogin.java.md b/docs/awsAuthBackendLogin.java.md index bdd70968..86ad0601 100644 --- a/docs/awsAuthBackendLogin.java.md +++ b/docs/awsAuthBackendLogin.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers @@ -54,7 +54,7 @@ AwsAuthBackendLogin.Builder.create(Construct scope, java.lang.String id) | iamRequestBody | java.lang.String | The Base64-encoded body of the signed request. | | iamRequestHeaders | java.lang.String | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iamRequestUrl | java.lang.String | The Base64-encoded HTTP URL used in the signed request. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | java.lang.String | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | nonce | java.lang.String | The nonce to be used for subsequent login requests. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- @@ -752,7 +752,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1349,7 +1349,7 @@ AwsAuthBackendLoginConfig.builder() | iamRequestBody | java.lang.String | The Base64-encoded body of the signed request. | | iamRequestHeaders | java.lang.String | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iamRequestUrl | java.lang.String | The Base64-encoded HTTP URL used in the signed request. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | java.lang.String | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | nonce | java.lang.String | The nonce to be used for subsequent login requests. | @@ -1439,7 +1439,7 @@ public java.lang.String getBackend(); AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1453,7 +1453,7 @@ public java.lang.String getIamHttpRequestMethod(); The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1467,7 +1467,7 @@ public java.lang.String getIamRequestBody(); The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1481,7 +1481,7 @@ public java.lang.String getIamRequestHeaders(); The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1495,7 +1495,7 @@ public java.lang.String getIamRequestUrl(); The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1507,7 +1507,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1524,7 +1524,7 @@ public java.lang.String getIdentity(); Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1538,7 +1538,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1552,7 +1552,7 @@ public java.lang.String getNonce(); The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1566,7 +1566,7 @@ public java.lang.String getPkcs7(); PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1580,7 +1580,7 @@ public java.lang.String getRole(); AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1594,7 +1594,7 @@ public java.lang.String getSignature(); Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendLogin.python.md b/docs/awsAuthBackendLogin.python.md index 5fb6b352..0cb3af4e 100644 --- a/docs/awsAuthBackendLogin.python.md +++ b/docs/awsAuthBackendLogin.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers @@ -52,7 +52,7 @@ awsAuthBackendLogin.AwsAuthBackendLogin( | iam_request_body | str | The Base64-encoded body of the signed request. | | iam_request_headers | str | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iam_request_url | str | The Base64-encoded HTTP URL used in the signed request. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | str | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | str | Target namespace. (requires Enterprise). | | nonce | str | The nonce to be used for subsequent login requests. | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -189,7 +189,7 @@ If you experience problems setting this value it might not be settable. Please t Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- @@ -796,7 +796,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1389,7 +1389,7 @@ awsAuthBackendLogin.AwsAuthBackendLoginConfig( | iam_request_body | str | The Base64-encoded body of the signed request. | | iam_request_headers | str | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iam_request_url | str | The Base64-encoded HTTP URL used in the signed request. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | str | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | str | Target namespace. (requires Enterprise). | | nonce | str | The nonce to be used for subsequent login requests. | @@ -1479,7 +1479,7 @@ backend: str AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1493,7 +1493,7 @@ iam_http_request_method: str The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1507,7 +1507,7 @@ iam_request_body: str The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1521,7 +1521,7 @@ iam_request_headers: str The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1535,7 +1535,7 @@ iam_request_url: str The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1547,7 +1547,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1564,7 +1564,7 @@ identity: str Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1578,7 +1578,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1592,7 +1592,7 @@ nonce: str The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1606,7 +1606,7 @@ pkcs7: str PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1620,7 +1620,7 @@ role: str AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1634,7 +1634,7 @@ signature: str Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendLogin.typescript.md b/docs/awsAuthBackendLogin.typescript.md index 50cd7186..7e9a4da8 100644 --- a/docs/awsAuthBackendLogin.typescript.md +++ b/docs/awsAuthBackendLogin.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1124,7 +1124,7 @@ const awsAuthBackendLoginConfig: awsAuthBackendLogin.AwsAuthBackendLoginConfig = | iamRequestBody | string | The Base64-encoded body of the signed request. | | iamRequestHeaders | string | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iamRequestUrl | string | The Base64-encoded HTTP URL used in the signed request. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | string | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | string | Target namespace. (requires Enterprise). | | nonce | string | The nonce to be used for subsequent login requests. | @@ -1214,7 +1214,7 @@ public readonly backend: string; AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1228,7 +1228,7 @@ public readonly iamHttpRequestMethod: string; The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1242,7 +1242,7 @@ public readonly iamRequestBody: string; The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1256,7 +1256,7 @@ public readonly iamRequestHeaders: string; The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1270,7 +1270,7 @@ public readonly iamRequestUrl: string; The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1282,7 +1282,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1299,7 +1299,7 @@ public readonly identity: string; Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1313,7 +1313,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1327,7 +1327,7 @@ public readonly nonce: string; The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1341,7 +1341,7 @@ public readonly pkcs7: string; PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1355,7 +1355,7 @@ public readonly role: string; AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1369,7 +1369,7 @@ public readonly signature: string; Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendRole.csharp.md b/docs/awsAuthBackendRole.csharp.md index aa467c1e..e589e82b 100644 --- a/docs/awsAuthBackendRole.csharp.md +++ b/docs/awsAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1579,7 +1579,7 @@ new AwsAuthBackendRoleConfig { | BoundSubnetIds | string[] | Only EC2 instances associated with this subnet ID will be permitted to log in. | | BoundVpcIds | string[] | Only EC2 instances associated with this VPC ID will be permitted to log in. | | DisallowReauthentication | object | When true, only allows a single token to be granted per instance ID. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | InferredAwsRegion | string | The region to search for the inferred entities in. | | InferredEntityType | string | The type of inferencing Vault should do. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1677,7 +1677,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -1691,7 +1691,7 @@ public object AllowInstanceMigration { get; set; } When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -1705,7 +1705,7 @@ public string AuthType { get; set; } The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -1719,7 +1719,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -1733,7 +1733,7 @@ public string[] BoundAccountIds { get; set; } Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -1747,7 +1747,7 @@ public string[] BoundAmiIds { get; set; } Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -1761,7 +1761,7 @@ public string[] BoundEc2InstanceIds { get; set; } Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -1775,7 +1775,7 @@ public string[] BoundIamInstanceProfileArns { get; set; } Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -1789,7 +1789,7 @@ public string[] BoundIamPrincipalArns { get; set; } The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -1803,7 +1803,7 @@ public string[] BoundIamRoleArns { get; set; } Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -1817,7 +1817,7 @@ public string[] BoundRegions { get; set; } Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -1831,7 +1831,7 @@ public string[] BoundSubnetIds { get; set; } Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -1845,7 +1845,7 @@ public string[] BoundVpcIds { get; set; } Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -1859,7 +1859,7 @@ public object DisallowReauthentication { get; set; } When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -1871,7 +1871,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1888,7 +1888,7 @@ public string InferredAwsRegion { get; set; } The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -1902,7 +1902,7 @@ public string InferredEntityType { get; set; } The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -1916,7 +1916,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -1932,7 +1932,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -1946,7 +1946,7 @@ public string RoleTag { get; set; } The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -1960,7 +1960,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -1974,7 +1974,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -1988,7 +1988,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -2002,7 +2002,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -2016,7 +2016,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -2030,7 +2030,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2044,7 +2044,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2058,7 +2058,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2072,7 +2072,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRole.go.md b/docs/awsAuthBackendRole.go.md index f38d8d72..e4931174 100644 --- a/docs/awsAuthBackendRole.go.md +++ b/docs/awsAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendrole" awsauthbackendrole.NewAwsAuthBackendRole(scope Construct, id *string, config AwsAuthBackendRoleConfig) AwsAuthBackendRole ``` @@ -574,7 +574,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendrole" awsauthbackendrole.AwsAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -606,7 +606,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendrole" awsauthbackendrole.AwsAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -620,7 +620,7 @@ awsauthbackendrole.AwsAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendrole" awsauthbackendrole.AwsAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -634,7 +634,7 @@ awsauthbackendrole.AwsAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendrole" awsauthbackendrole.AwsAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1512,7 +1512,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendrole" &awsauthbackendrole.AwsAuthBackendRoleConfig { Connection: interface{}, @@ -1579,7 +1579,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendrole" | BoundSubnetIds | *[]*string | Only EC2 instances associated with this subnet ID will be permitted to log in. | | BoundVpcIds | *[]*string | Only EC2 instances associated with this VPC ID will be permitted to log in. | | DisallowReauthentication | interface{} | When true, only allows a single token to be granted per instance ID. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | InferredAwsRegion | *string | The region to search for the inferred entities in. | | InferredEntityType | *string | The type of inferencing Vault should do. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1677,7 +1677,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -1691,7 +1691,7 @@ AllowInstanceMigration interface{} When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -1705,7 +1705,7 @@ AuthType *string The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -1719,7 +1719,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -1733,7 +1733,7 @@ BoundAccountIds *[]*string Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -1747,7 +1747,7 @@ BoundAmiIds *[]*string Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -1761,7 +1761,7 @@ BoundEc2InstanceIds *[]*string Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -1775,7 +1775,7 @@ BoundIamInstanceProfileArns *[]*string Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -1789,7 +1789,7 @@ BoundIamPrincipalArns *[]*string The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -1803,7 +1803,7 @@ BoundIamRoleArns *[]*string Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -1817,7 +1817,7 @@ BoundRegions *[]*string Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -1831,7 +1831,7 @@ BoundSubnetIds *[]*string Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -1845,7 +1845,7 @@ BoundVpcIds *[]*string Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -1859,7 +1859,7 @@ DisallowReauthentication interface{} When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -1871,7 +1871,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1888,7 +1888,7 @@ InferredAwsRegion *string The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -1902,7 +1902,7 @@ InferredEntityType *string The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -1916,7 +1916,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -1932,7 +1932,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -1946,7 +1946,7 @@ RoleTag *string The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -1960,7 +1960,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -1974,7 +1974,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -1988,7 +1988,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -2002,7 +2002,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -2016,7 +2016,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -2030,7 +2030,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2044,7 +2044,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2058,7 +2058,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2072,7 +2072,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRole.java.md b/docs/awsAuthBackendRole.java.md index bfba089b..9d254bb9 100644 --- a/docs/awsAuthBackendRole.java.md +++ b/docs/awsAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers @@ -84,7 +84,7 @@ AwsAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | boundSubnetIds | java.util.List | Only EC2 instances associated with this subnet ID will be permitted to log in. | | boundVpcIds | java.util.List | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallowReauthentication | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When true, only allows a single token to be granted per instance ID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferredAwsRegion | java.lang.String | The region to search for the inferred entities in. | | inferredEntityType | java.lang.String | The type of inferencing Vault should do. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -168,7 +168,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -319,7 +319,7 @@ If you experience problems setting this value it might not be settable. Please t The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -351,7 +351,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -361,7 +361,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -371,7 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -381,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -391,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -401,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -411,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -421,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -431,7 +431,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -441,7 +441,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -451,7 +451,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- @@ -1074,7 +1074,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1998,7 +1998,7 @@ AwsAuthBackendRoleConfig.builder() | boundSubnetIds | java.util.List | Only EC2 instances associated with this subnet ID will be permitted to log in. | | boundVpcIds | java.util.List | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallowReauthentication | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When true, only allows a single token to be granted per instance ID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferredAwsRegion | java.lang.String | The region to search for the inferred entities in. | | inferredEntityType | java.lang.String | The type of inferencing Vault should do. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -2096,7 +2096,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -2110,7 +2110,7 @@ public java.lang.Object getAllowInstanceMigration(); When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -2124,7 +2124,7 @@ public java.lang.String getAuthType(); The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -2138,7 +2138,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -2152,7 +2152,7 @@ public java.util.List getBoundAccountIds(); Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -2166,7 +2166,7 @@ public java.util.List getBoundAmiIds(); Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -2180,7 +2180,7 @@ public java.util.List getBoundEc2InstanceIds(); Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -2194,7 +2194,7 @@ public java.util.List getBoundIamInstanceProfileArns(); Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -2208,7 +2208,7 @@ public java.util.List getBoundIamPrincipalArns(); The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -2222,7 +2222,7 @@ public java.util.List getBoundIamRoleArns(); Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -2236,7 +2236,7 @@ public java.util.List getBoundRegions(); Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -2250,7 +2250,7 @@ public java.util.List getBoundSubnetIds(); Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -2264,7 +2264,7 @@ public java.util.List getBoundVpcIds(); Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -2278,7 +2278,7 @@ public java.lang.Object getDisallowReauthentication(); When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -2290,7 +2290,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2307,7 +2307,7 @@ public java.lang.String getInferredAwsRegion(); The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -2321,7 +2321,7 @@ public java.lang.String getInferredEntityType(); The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -2335,7 +2335,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -2351,7 +2351,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -2365,7 +2365,7 @@ public java.lang.String getRoleTag(); The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -2379,7 +2379,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -2393,7 +2393,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -2407,7 +2407,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -2421,7 +2421,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -2435,7 +2435,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -2449,7 +2449,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2463,7 +2463,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2477,7 +2477,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2491,7 +2491,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRole.python.md b/docs/awsAuthBackendRole.python.md index 21da95b0..b72fb280 100644 --- a/docs/awsAuthBackendRole.python.md +++ b/docs/awsAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers @@ -78,7 +78,7 @@ awsAuthBackendRole.AwsAuthBackendRole( | bound_subnet_ids | typing.List[str] | Only EC2 instances associated with this subnet ID will be permitted to log in. | | bound_vpc_ids | typing.List[str] | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallow_reauthentication | typing.Union[bool, cdktf.IResolvable] | When true, only allows a single token to be granted per instance ID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferred_aws_region | str | The region to search for the inferred entities in. | | inferred_entity_type | str | The type of inferencing Vault should do. | | namespace | str | Target namespace. (requires Enterprise). | @@ -162,7 +162,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -300,7 +300,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -313,7 +313,7 @@ If you experience problems setting this value it might not be settable. Please t The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -333,7 +333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -345,7 +345,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -355,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -385,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -395,7 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -405,7 +405,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -415,7 +415,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -425,7 +425,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -435,7 +435,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -445,7 +445,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- @@ -1114,7 +1114,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2030,7 +2030,7 @@ awsAuthBackendRole.AwsAuthBackendRoleConfig( | bound_subnet_ids | typing.List[str] | Only EC2 instances associated with this subnet ID will be permitted to log in. | | bound_vpc_ids | typing.List[str] | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallow_reauthentication | typing.Union[bool, cdktf.IResolvable] | When true, only allows a single token to be granted per instance ID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferred_aws_region | str | The region to search for the inferred entities in. | | inferred_entity_type | str | The type of inferencing Vault should do. | | namespace | str | Target namespace. (requires Enterprise). | @@ -2128,7 +2128,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -2142,7 +2142,7 @@ allow_instance_migration: typing.Union[bool, IResolvable] When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -2156,7 +2156,7 @@ auth_type: str The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -2170,7 +2170,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -2184,7 +2184,7 @@ bound_account_ids: typing.List[str] Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -2198,7 +2198,7 @@ bound_ami_ids: typing.List[str] Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -2212,7 +2212,7 @@ bound_ec2_instance_ids: typing.List[str] Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -2226,7 +2226,7 @@ bound_iam_instance_profile_arns: typing.List[str] Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -2240,7 +2240,7 @@ bound_iam_principal_arns: typing.List[str] The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -2254,7 +2254,7 @@ bound_iam_role_arns: typing.List[str] Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -2268,7 +2268,7 @@ bound_regions: typing.List[str] Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -2282,7 +2282,7 @@ bound_subnet_ids: typing.List[str] Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -2296,7 +2296,7 @@ bound_vpc_ids: typing.List[str] Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -2310,7 +2310,7 @@ disallow_reauthentication: typing.Union[bool, IResolvable] When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -2322,7 +2322,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2339,7 +2339,7 @@ inferred_aws_region: str The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -2353,7 +2353,7 @@ inferred_entity_type: str The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -2367,7 +2367,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -2383,7 +2383,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -2397,7 +2397,7 @@ role_tag: str The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -2411,7 +2411,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -2425,7 +2425,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -2439,7 +2439,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -2453,7 +2453,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -2467,7 +2467,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -2481,7 +2481,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2495,7 +2495,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2509,7 +2509,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2523,7 +2523,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRole.typescript.md b/docs/awsAuthBackendRole.typescript.md index 43829fae..fdc10e20 100644 --- a/docs/awsAuthBackendRole.typescript.md +++ b/docs/awsAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1542,7 +1542,7 @@ const awsAuthBackendRoleConfig: awsAuthBackendRole.AwsAuthBackendRoleConfig = { | boundSubnetIds | string[] | Only EC2 instances associated with this subnet ID will be permitted to log in. | | boundVpcIds | string[] | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallowReauthentication | boolean \| cdktf.IResolvable | When true, only allows a single token to be granted per instance ID. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferredAwsRegion | string | The region to search for the inferred entities in. | | inferredEntityType | string | The type of inferencing Vault should do. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1640,7 +1640,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -1654,7 +1654,7 @@ public readonly allowInstanceMigration: boolean | IResolvable; When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -1668,7 +1668,7 @@ public readonly authType: string; The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -1682,7 +1682,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -1696,7 +1696,7 @@ public readonly boundAccountIds: string[]; Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -1710,7 +1710,7 @@ public readonly boundAmiIds: string[]; Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -1724,7 +1724,7 @@ public readonly boundEc2InstanceIds: string[]; Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -1738,7 +1738,7 @@ public readonly boundIamInstanceProfileArns: string[]; Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -1752,7 +1752,7 @@ public readonly boundIamPrincipalArns: string[]; The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -1766,7 +1766,7 @@ public readonly boundIamRoleArns: string[]; Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -1780,7 +1780,7 @@ public readonly boundRegions: string[]; Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -1794,7 +1794,7 @@ public readonly boundSubnetIds: string[]; Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -1808,7 +1808,7 @@ public readonly boundVpcIds: string[]; Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -1822,7 +1822,7 @@ public readonly disallowReauthentication: boolean | IResolvable; When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -1834,7 +1834,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1851,7 +1851,7 @@ public readonly inferredAwsRegion: string; The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -1865,7 +1865,7 @@ public readonly inferredEntityType: string; The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -1879,7 +1879,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -1895,7 +1895,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -1909,7 +1909,7 @@ public readonly roleTag: string; The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -1923,7 +1923,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -1937,7 +1937,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -1951,7 +1951,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -1965,7 +1965,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -1979,7 +1979,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -1993,7 +1993,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2007,7 +2007,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2021,7 +2021,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2035,7 +2035,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRoleTag.csharp.md b/docs/awsAuthBackendRoleTag.csharp.md index ed9f3a29..af31ad37 100644 --- a/docs/awsAuthBackendRoleTag.csharp.md +++ b/docs/awsAuthBackendRoleTag.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ new AwsAuthBackendRoleTagConfig { | AllowInstanceMigration | object | Allows migration of the underlying instance where the client resides. | | Backend | string | AWS auth backend to read tags from. | | DisallowReauthentication | object | Only allow a single token to be granted per instance ID. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | InstanceId | string | Instance ID for which this tag is intended. | | MaxTtl | string | The maximum allowed lifetime of tokens issued using this role. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1068,7 +1068,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1082,7 +1082,7 @@ public object AllowInstanceMigration { get; set; } Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1096,7 +1096,7 @@ public string Backend { get; set; } AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1110,7 +1110,7 @@ public object DisallowReauthentication { get; set; } Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1122,7 +1122,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1141,7 +1141,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1155,7 +1155,7 @@ public string MaxTtl { get; set; } The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1169,7 +1169,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1183,7 +1183,7 @@ public string[] Policies { get; set; } Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoleTag.go.md b/docs/awsAuthBackendRoleTag.go.md index a8dda0a2..cf375c50 100644 --- a/docs/awsAuthBackendRoleTag.go.md +++ b/docs/awsAuthBackendRoleTag.go.md @@ -4,12 +4,12 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag" awsauthbackendroletag.NewAwsAuthBackendRoleTag(scope Construct, id *string, config AwsAuthBackendRoleTagConfig) AwsAuthBackendRoleTag ``` @@ -434,7 +434,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag" awsauthbackendroletag.AwsAuthBackendRoleTag_IsConstruct(x interface{}) *bool ``` @@ -466,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag" awsauthbackendroletag.AwsAuthBackendRoleTag_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +480,7 @@ awsauthbackendroletag.AwsAuthBackendRoleTag_IsTerraformElement(x interface{}) *b ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag" awsauthbackendroletag.AwsAuthBackendRoleTag_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +494,7 @@ awsauthbackendroletag.AwsAuthBackendRoleTag_IsTerraformResource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag" awsauthbackendroletag.AwsAuthBackendRoleTag_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -523,7 +523,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -943,7 +943,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag" &awsauthbackendroletag.AwsAuthBackendRoleTagConfig { Connection: interface{}, @@ -980,7 +980,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag | AllowInstanceMigration | interface{} | Allows migration of the underlying instance where the client resides. | | Backend | *string | AWS auth backend to read tags from. | | DisallowReauthentication | interface{} | Only allow a single token to be granted per instance ID. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | InstanceId | *string | Instance ID for which this tag is intended. | | MaxTtl | *string | The maximum allowed lifetime of tokens issued using this role. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1068,7 +1068,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1082,7 +1082,7 @@ AllowInstanceMigration interface{} Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1096,7 +1096,7 @@ Backend *string AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1110,7 +1110,7 @@ DisallowReauthentication interface{} Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1122,7 +1122,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1141,7 +1141,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1155,7 +1155,7 @@ MaxTtl *string The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1169,7 +1169,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1183,7 +1183,7 @@ Policies *[]*string Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoleTag.java.md b/docs/awsAuthBackendRoleTag.java.md index 0ac32481..6ce75450 100644 --- a/docs/awsAuthBackendRoleTag.java.md +++ b/docs/awsAuthBackendRoleTag.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers @@ -52,7 +52,7 @@ AwsAuthBackendRoleTag.Builder.create(Construct scope, java.lang.String id) | allowInstanceMigration | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Allows migration of the underlying instance where the client resides. | | backend | java.lang.String | AWS auth backend to read tags from. | | disallowReauthentication | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only allow a single token to be granted per instance ID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instanceId | java.lang.String | Instance ID for which this tag is intended. | | maxTtl | java.lang.String | The maximum allowed lifetime of tokens issued using this role. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- @@ -692,7 +692,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -1155,7 +1155,7 @@ AwsAuthBackendRoleTagConfig.builder() | allowInstanceMigration | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Allows migration of the underlying instance where the client resides. | | backend | java.lang.String | AWS auth backend to read tags from. | | disallowReauthentication | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only allow a single token to be granted per instance ID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instanceId | java.lang.String | Instance ID for which this tag is intended. | | maxTtl | java.lang.String | The maximum allowed lifetime of tokens issued using this role. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1243,7 +1243,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1257,7 +1257,7 @@ public java.lang.Object getAllowInstanceMigration(); Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1271,7 +1271,7 @@ public java.lang.String getBackend(); AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1285,7 +1285,7 @@ public java.lang.Object getDisallowReauthentication(); Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1297,7 +1297,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1316,7 +1316,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1330,7 +1330,7 @@ public java.lang.String getMaxTtl(); The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1344,7 +1344,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1358,7 +1358,7 @@ public java.util.List getPolicies(); Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoleTag.python.md b/docs/awsAuthBackendRoleTag.python.md index 418d0c5c..99c2b7b7 100644 --- a/docs/awsAuthBackendRoleTag.python.md +++ b/docs/awsAuthBackendRoleTag.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers @@ -48,7 +48,7 @@ awsAuthBackendRoleTag.AwsAuthBackendRoleTag( | allow_instance_migration | typing.Union[bool, cdktf.IResolvable] | Allows migration of the underlying instance where the client resides. | | backend | str | AWS auth backend to read tags from. | | disallow_reauthentication | typing.Union[bool, cdktf.IResolvable] | Only allow a single token to be granted per instance ID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instance_id | str | Instance ID for which this tag is intended. | | max_ttl | str | The maximum allowed lifetime of tokens issued using this role. | | namespace | str | Target namespace. (requires Enterprise). | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -175,7 +175,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- @@ -734,7 +734,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -1191,7 +1191,7 @@ awsAuthBackendRoleTag.AwsAuthBackendRoleTagConfig( | allow_instance_migration | typing.Union[bool, cdktf.IResolvable] | Allows migration of the underlying instance where the client resides. | | backend | str | AWS auth backend to read tags from. | | disallow_reauthentication | typing.Union[bool, cdktf.IResolvable] | Only allow a single token to be granted per instance ID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instance_id | str | Instance ID for which this tag is intended. | | max_ttl | str | The maximum allowed lifetime of tokens issued using this role. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1279,7 +1279,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1293,7 +1293,7 @@ allow_instance_migration: typing.Union[bool, IResolvable] Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1307,7 +1307,7 @@ backend: str AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1321,7 +1321,7 @@ disallow_reauthentication: typing.Union[bool, IResolvable] Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1333,7 +1333,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1352,7 +1352,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1366,7 +1366,7 @@ max_ttl: str The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1380,7 +1380,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1394,7 +1394,7 @@ policies: typing.List[str] Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoleTag.typescript.md b/docs/awsAuthBackendRoleTag.typescript.md index 043f925d..8219e202 100644 --- a/docs/awsAuthBackendRoleTag.typescript.md +++ b/docs/awsAuthBackendRoleTag.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -963,7 +963,7 @@ const awsAuthBackendRoleTagConfig: awsAuthBackendRoleTag.AwsAuthBackendRoleTagCo | allowInstanceMigration | boolean \| cdktf.IResolvable | Allows migration of the underlying instance where the client resides. | | backend | string | AWS auth backend to read tags from. | | disallowReauthentication | boolean \| cdktf.IResolvable | Only allow a single token to be granted per instance ID. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instanceId | string | Instance ID for which this tag is intended. | | maxTtl | string | The maximum allowed lifetime of tokens issued using this role. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1051,7 +1051,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1065,7 +1065,7 @@ public readonly allowInstanceMigration: boolean | IResolvable; Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1079,7 +1079,7 @@ public readonly backend: string; AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1093,7 +1093,7 @@ public readonly disallowReauthentication: boolean | IResolvable; Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1105,7 +1105,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1124,7 +1124,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1138,7 +1138,7 @@ public readonly maxTtl: string; The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1152,7 +1152,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1166,7 +1166,7 @@ public readonly policies: string[]; Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.csharp.md b/docs/awsAuthBackendRoletagBlacklist.csharp.md index 783a9b3d..8b6bd4ca 100644 --- a/docs/awsAuthBackendRoletagBlacklist.csharp.md +++ b/docs/awsAuthBackendRoletagBlacklist.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new AwsAuthBackendRoletagBlacklistConfig { | Provisioners | object[] | *No description.* | | Backend | string | Unique name of the auth backend to configure. | | DisablePeriodicTidy | object | If true, disables the periodic tidying of the roletag blacklist entries. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SafetyBuffer | double | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -922,7 +922,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -936,7 +936,7 @@ public object DisablePeriodicTidy { get; set; } If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -979,7 +979,7 @@ public double SafetyBuffer { get; set; } The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.go.md b/docs/awsAuthBackendRoletagBlacklist.go.md index 078b1821..2b2d4cec 100644 --- a/docs/awsAuthBackendRoletagBlacklist.go.md +++ b/docs/awsAuthBackendRoletagBlacklist.go.md @@ -4,12 +4,12 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.NewAwsAuthBackendRoletagBlacklist(scope Construct, id *string, config AwsAuthBackendRoletagBlacklistConfig) AwsAuthBackendRoletagBlacklist ``` @@ -406,7 +406,7 @@ func ResetSafetyBuffer() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsTerraformElement ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_IsTerraformResourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletagblacklist" awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklist_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -805,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletagblacklist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletagblacklist" &awsauthbackendroletagblacklist.AwsAuthBackendRoletagBlacklistConfig { Connection: interface{}, @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendroletag | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Unique name of the auth backend to configure. | | DisablePeriodicTidy | interface{} | If true, disables the periodic tidying of the roletag blacklist entries. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SafetyBuffer | *f64 | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -922,7 +922,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -936,7 +936,7 @@ DisablePeriodicTidy interface{} If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -979,7 +979,7 @@ SafetyBuffer *f64 The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.java.md b/docs/awsAuthBackendRoletagBlacklist.java.md index 6d434e48..6fd2cbbf 100644 --- a/docs/awsAuthBackendRoletagBlacklist.java.md +++ b/docs/awsAuthBackendRoletagBlacklist.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers @@ -45,7 +45,7 @@ AwsAuthBackendRoletagBlacklist.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Unique name of the auth backend to configure. | | disablePeriodicTidy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | safetyBuffer | java.lang.Number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -148,7 +148,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- @@ -613,7 +613,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -959,7 +959,7 @@ AwsAuthBackendRoletagBlacklistConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Unique name of the auth backend to configure. | | disablePeriodicTidy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | safetyBuffer | java.lang.Number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -1045,7 +1045,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -1059,7 +1059,7 @@ public java.lang.Object getDisablePeriodicTidy(); If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -1071,7 +1071,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1088,7 +1088,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -1102,7 +1102,7 @@ public java.lang.Number getSafetyBuffer(); The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.python.md b/docs/awsAuthBackendRoletagBlacklist.python.md index e5e62e4e..ccdefe1c 100644 --- a/docs/awsAuthBackendRoletagBlacklist.python.md +++ b/docs/awsAuthBackendRoletagBlacklist.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers @@ -42,7 +42,7 @@ awsAuthBackendRoletagBlacklist.AwsAuthBackendRoletagBlacklist( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Unique name of the auth backend to configure. | | disable_periodic_tidy | typing.Union[bool, cdktf.IResolvable] | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | str | Target namespace. (requires Enterprise). | | safety_buffer | typing.Union[int, float] | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ awsAuthBackendRoletagBlacklist.AwsAuthBackendRoletagBlacklistConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Unique name of the auth backend to configure. | | disable_periodic_tidy | typing.Union[bool, cdktf.IResolvable] | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | str | Target namespace. (requires Enterprise). | | safety_buffer | typing.Union[int, float] | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -1083,7 +1083,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -1097,7 +1097,7 @@ disable_periodic_tidy: typing.Union[bool, IResolvable] If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -1140,7 +1140,7 @@ safety_buffer: typing.Union[int, float] The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.typescript.md b/docs/awsAuthBackendRoletagBlacklist.typescript.md index 22b775c5..535e4df6 100644 --- a/docs/awsAuthBackendRoletagBlacklist.typescript.md +++ b/docs/awsAuthBackendRoletagBlacklist.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const awsAuthBackendRoletagBlacklistConfig: awsAuthBackendRoletagBlacklist.AwsAu | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Unique name of the auth backend to configure. | | disablePeriodicTidy | boolean \| cdktf.IResolvable | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | string | Target namespace. (requires Enterprise). | | safetyBuffer | number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -909,7 +909,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -923,7 +923,7 @@ public readonly disablePeriodicTidy: boolean | IResolvable; If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -966,7 +966,7 @@ public readonly safetyBuffer: number; The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendStsRole.csharp.md b/docs/awsAuthBackendStsRole.csharp.md index 22bdd850..e55fa7a3 100644 --- a/docs/awsAuthBackendStsRole.csharp.md +++ b/docs/awsAuthBackendStsRole.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ new AwsAuthBackendStsRoleConfig { | AccountId | string | AWS account ID to be associated with STS role. | | StsRole | string | AWS ARN for STS role to be assumed when interacting with the account specified. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ public string AccountId { get; set; } AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -929,7 +929,7 @@ public string StsRole { get; set; } AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -943,7 +943,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -955,7 +955,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsAuthBackendStsRole.go.md b/docs/awsAuthBackendStsRole.go.md index 88addf8b..26f3846e 100644 --- a/docs/awsAuthBackendStsRole.go.md +++ b/docs/awsAuthBackendStsRole.go.md @@ -4,12 +4,12 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendstsrole" awsauthbackendstsrole.NewAwsAuthBackendStsRole(scope Construct, id *string, config AwsAuthBackendStsRoleConfig) AwsAuthBackendStsRole ``` @@ -399,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendstsrole" awsauthbackendstsrole.AwsAuthBackendStsRole_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendstsrole" awsauthbackendstsrole.AwsAuthBackendStsRole_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ awsauthbackendstsrole.AwsAuthBackendStsRole_IsTerraformElement(x interface{}) *b ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendstsrole" awsauthbackendstsrole.AwsAuthBackendStsRole_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ awsauthbackendstsrole.AwsAuthBackendStsRole_IsTerraformResource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendstsrole" awsauthbackendstsrole.AwsAuthBackendStsRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -798,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendstsrole" &awsauthbackendstsrole.AwsAuthBackendStsRoleConfig { Connection: interface{}, @@ -830,7 +830,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awsauthbackendstsrole | AccountId | *string | AWS account ID to be associated with STS role. | | StsRole | *string | AWS ARN for STS role to be assumed when interacting with the account specified. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ AccountId *string AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -929,7 +929,7 @@ StsRole *string AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -943,7 +943,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -955,7 +955,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsAuthBackendStsRole.java.md b/docs/awsAuthBackendStsRole.java.md index b3cbe586..8f8434e5 100644 --- a/docs/awsAuthBackendStsRole.java.md +++ b/docs/awsAuthBackendStsRole.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers @@ -45,7 +45,7 @@ AwsAuthBackendStsRole.Builder.create(Construct scope, java.lang.String id) | accountId | java.lang.String | AWS account ID to be associated with STS role. | | stsRole | java.lang.String | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- @@ -605,7 +605,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -951,7 +951,7 @@ AwsAuthBackendStsRoleConfig.builder() | accountId | java.lang.String | AWS account ID to be associated with STS role. | | stsRole | java.lang.String | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1036,7 +1036,7 @@ public java.lang.String getAccountId(); AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -1050,7 +1050,7 @@ public java.lang.String getStsRole(); AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -1064,7 +1064,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -1076,7 +1076,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1093,7 +1093,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsAuthBackendStsRole.python.md b/docs/awsAuthBackendStsRole.python.md index e7e0550c..5933e877 100644 --- a/docs/awsAuthBackendStsRole.python.md +++ b/docs/awsAuthBackendStsRole.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers @@ -43,7 +43,7 @@ awsAuthBackendStsRole.AwsAuthBackendStsRole( | account_id | str | AWS account ID to be associated with STS role. | | sts_role | str | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -991,7 +991,7 @@ awsAuthBackendStsRole.AwsAuthBackendStsRoleConfig( | account_id | str | AWS account ID to be associated with STS role. | | sts_role | str | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1076,7 +1076,7 @@ account_id: str AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -1090,7 +1090,7 @@ sts_role: str AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -1104,7 +1104,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -1116,7 +1116,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1133,7 +1133,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsAuthBackendStsRole.typescript.md b/docs/awsAuthBackendStsRole.typescript.md index bac4a264..7b57fcb6 100644 --- a/docs/awsAuthBackendStsRole.typescript.md +++ b/docs/awsAuthBackendStsRole.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -817,7 +817,7 @@ const awsAuthBackendStsRoleConfig: awsAuthBackendStsRole.AwsAuthBackendStsRoleCo | accountId | string | AWS account ID to be associated with STS role. | | stsRole | string | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -902,7 +902,7 @@ public readonly accountId: string; AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -916,7 +916,7 @@ public readonly stsRole: string; AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -930,7 +930,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -942,7 +942,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -959,7 +959,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsSecretBackend.csharp.md b/docs/awsSecretBackend.csharp.md index e0b4965e..e4831263 100644 --- a/docs/awsSecretBackend.csharp.md +++ b/docs/awsSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1236,7 +1236,7 @@ new AwsSecretBackendConfig { | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | | IamEndpoint | string | Specifies a custom HTTP IAM endpoint to use. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | IdentityTokenAudience | string | The audience claim value. | | IdentityTokenKey | string | The key to use for signing identity tokens. | | IdentityTokenTtl | double | The TTL of generated identity tokens in seconds. | @@ -1332,7 +1332,7 @@ public string AccessKey { get; set; } The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1346,7 +1346,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1360,7 +1360,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1374,7 +1374,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1388,7 +1388,7 @@ public string IamEndpoint { get; set; } Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1400,7 +1400,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1417,7 +1417,7 @@ public string IdentityTokenAudience { get; set; } The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1431,7 +1431,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1445,7 +1445,7 @@ public double IdentityTokenTtl { get; set; } The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1459,7 +1459,7 @@ public object Local { get; set; } Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1473,7 +1473,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1487,7 +1487,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1501,7 +1501,7 @@ public string Path { get; set; } Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1515,7 +1515,7 @@ public string Region { get; set; } The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1529,7 +1529,7 @@ public string RoleArn { get; set; } Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1543,7 +1543,7 @@ public string SecretKey { get; set; } The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1557,7 +1557,7 @@ public string StsEndpoint { get; set; } Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1571,7 +1571,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackend.go.md b/docs/awsSecretBackend.go.md index 56ebeb2c..d3885549 100644 --- a/docs/awsSecretBackend.go.md +++ b/docs/awsSecretBackend.go.md @@ -4,12 +4,12 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackend" awssecretbackend.NewAwsSecretBackend(scope Construct, id *string, config AwsSecretBackendConfig) AwsSecretBackend ``` @@ -504,7 +504,7 @@ func ResetUsernameTemplate() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackend" awssecretbackend.AwsSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -536,7 +536,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackend" awssecretbackend.AwsSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -550,7 +550,7 @@ awssecretbackend.AwsSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackend" awssecretbackend.AwsSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -564,7 +564,7 @@ awssecretbackend.AwsSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackend" awssecretbackend.AwsSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -593,7 +593,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1189,7 +1189,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackend" &awssecretbackend.AwsSecretBackendConfig { Connection: interface{}, @@ -1236,7 +1236,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackend" | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | | IamEndpoint | *string | Specifies a custom HTTP IAM endpoint to use. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | IdentityTokenAudience | *string | The audience claim value. | | IdentityTokenKey | *string | The key to use for signing identity tokens. | | IdentityTokenTtl | *f64 | The TTL of generated identity tokens in seconds. | @@ -1332,7 +1332,7 @@ AccessKey *string The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1346,7 +1346,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1360,7 +1360,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1374,7 +1374,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1388,7 +1388,7 @@ IamEndpoint *string Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1400,7 +1400,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1417,7 +1417,7 @@ IdentityTokenAudience *string The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1431,7 +1431,7 @@ IdentityTokenKey *string The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1445,7 +1445,7 @@ IdentityTokenTtl *f64 The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1459,7 +1459,7 @@ Local interface{} Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1473,7 +1473,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1487,7 +1487,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1501,7 +1501,7 @@ Path *string Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1515,7 +1515,7 @@ Region *string The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1529,7 +1529,7 @@ RoleArn *string Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1543,7 +1543,7 @@ SecretKey *string The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1557,7 +1557,7 @@ StsEndpoint *string Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1571,7 +1571,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackend.java.md b/docs/awsSecretBackend.java.md index e99e2025..666b896b 100644 --- a/docs/awsSecretBackend.java.md +++ b/docs/awsSecretBackend.java.md @@ -4,7 +4,7 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers @@ -62,7 +62,7 @@ AwsSecretBackend.Builder.create(Construct scope, java.lang.String id) | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | iamEndpoint | java.lang.String | Specifies a custom HTTP IAM endpoint to use. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | @@ -144,7 +144,7 @@ Must be unique amongst siblings in the same scope The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -205,7 +205,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -305,7 +305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- @@ -868,7 +868,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1517,7 +1517,7 @@ AwsSecretBackendConfig.builder() | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | iamEndpoint | java.lang.String | Specifies a custom HTTP IAM endpoint to use. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | @@ -1613,7 +1613,7 @@ public java.lang.String getAccessKey(); The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1627,7 +1627,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1641,7 +1641,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1655,7 +1655,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1669,7 +1669,7 @@ public java.lang.String getIamEndpoint(); Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1681,7 +1681,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1698,7 +1698,7 @@ public java.lang.String getIdentityTokenAudience(); The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1712,7 +1712,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1726,7 +1726,7 @@ public java.lang.Number getIdentityTokenTtl(); The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1740,7 +1740,7 @@ public java.lang.Object getLocal(); Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1754,7 +1754,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1768,7 +1768,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1782,7 +1782,7 @@ public java.lang.String getPath(); Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1796,7 +1796,7 @@ public java.lang.String getRegion(); The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1810,7 +1810,7 @@ public java.lang.String getRoleArn(); Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1824,7 +1824,7 @@ public java.lang.String getSecretKey(); The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1838,7 +1838,7 @@ public java.lang.String getStsEndpoint(); Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1852,7 +1852,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackend.python.md b/docs/awsSecretBackend.python.md index d00570a4..31440a84 100644 --- a/docs/awsSecretBackend.python.md +++ b/docs/awsSecretBackend.python.md @@ -4,7 +4,7 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers @@ -58,7 +58,7 @@ awsSecretBackend.AwsSecretBackend( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | iam_endpoint | str | Specifies a custom HTTP IAM endpoint to use. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- @@ -910,7 +910,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1553,7 +1553,7 @@ awsSecretBackend.AwsSecretBackendConfig( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | iam_endpoint | str | Specifies a custom HTTP IAM endpoint to use. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | @@ -1649,7 +1649,7 @@ access_key: str The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1663,7 +1663,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1677,7 +1677,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1691,7 +1691,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1705,7 +1705,7 @@ iam_endpoint: str Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1717,7 +1717,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1734,7 +1734,7 @@ identity_token_audience: str The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1748,7 +1748,7 @@ identity_token_key: str The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1762,7 +1762,7 @@ identity_token_ttl: typing.Union[int, float] The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1776,7 +1776,7 @@ local: typing.Union[bool, IResolvable] Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1790,7 +1790,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1804,7 +1804,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1818,7 +1818,7 @@ path: str Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1832,7 +1832,7 @@ region: str The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1846,7 +1846,7 @@ role_arn: str Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1860,7 +1860,7 @@ secret_key: str The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1874,7 +1874,7 @@ sts_endpoint: str Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1888,7 +1888,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackend.typescript.md b/docs/awsSecretBackend.typescript.md index 76209be8..82abb36a 100644 --- a/docs/awsSecretBackend.typescript.md +++ b/docs/awsSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1210,7 +1210,7 @@ const awsSecretBackendConfig: awsSecretBackend.AwsSecretBackendConfig = { ... } | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | | iamEndpoint | string | Specifies a custom HTTP IAM endpoint to use. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identityTokenAudience | string | The audience claim value. | | identityTokenKey | string | The key to use for signing identity tokens. | | identityTokenTtl | number | The TTL of generated identity tokens in seconds. | @@ -1306,7 +1306,7 @@ public readonly accessKey: string; The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1320,7 +1320,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1334,7 +1334,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1348,7 +1348,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1362,7 +1362,7 @@ public readonly iamEndpoint: string; Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1374,7 +1374,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1391,7 +1391,7 @@ public readonly identityTokenAudience: string; The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1405,7 +1405,7 @@ public readonly identityTokenKey: string; The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1419,7 +1419,7 @@ public readonly identityTokenTtl: number; The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1433,7 +1433,7 @@ public readonly local: boolean | IResolvable; Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1447,7 +1447,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1461,7 +1461,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1475,7 +1475,7 @@ public readonly path: string; Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1489,7 +1489,7 @@ public readonly region: string; The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1503,7 +1503,7 @@ public readonly roleArn: string; Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1517,7 +1517,7 @@ public readonly secretKey: string; The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1531,7 +1531,7 @@ public readonly stsEndpoint: string; Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1545,7 +1545,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackendRole.csharp.md b/docs/awsSecretBackendRole.csharp.md index 641f2cd0..25242e59 100644 --- a/docs/awsSecretBackendRole.csharp.md +++ b/docs/awsSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers @@ -537,7 +537,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1065,7 +1065,7 @@ new AwsSecretBackendRoleConfig { | Name | string | Unique name for the role. | | DefaultStsTtl | double | The default TTL in seconds for STS credentials. | | IamGroups | string[] | A list of IAM group names. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | MaxStsTtl | double | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | Namespace | string | Target namespace. (requires Enterprise). | | PermissionsBoundaryArn | string | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1156,7 +1156,7 @@ public string Backend { get; set; } The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1170,7 +1170,7 @@ public string CredentialType { get; set; } Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1184,7 +1184,7 @@ public string Name { get; set; } Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1200,7 +1200,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1216,7 +1216,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1228,7 +1228,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1247,7 +1247,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1261,7 +1261,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1277,7 +1277,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1291,7 +1291,7 @@ public string[] PolicyArns { get; set; } ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1305,7 +1305,7 @@ public string PolicyDocument { get; set; } IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1319,7 +1319,7 @@ public string[] RoleArns { get; set; } ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1333,7 +1333,7 @@ public string UserPath { get; set; } The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendRole.go.md b/docs/awsSecretBackendRole.go.md index 994bbc3b..53930bd8 100644 --- a/docs/awsSecretBackendRole.go.md +++ b/docs/awsSecretBackendRole.go.md @@ -4,12 +4,12 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendrole" awssecretbackendrole.NewAwsSecretBackendRole(scope Construct, id *string, config AwsSecretBackendRoleConfig) AwsSecretBackendRole ``` @@ -448,7 +448,7 @@ func ResetUserPath() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendrole" awssecretbackendrole.AwsSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -480,7 +480,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendrole" awssecretbackendrole.AwsSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -494,7 +494,7 @@ awssecretbackendrole.AwsSecretBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendrole" awssecretbackendrole.AwsSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -508,7 +508,7 @@ awssecretbackendrole.AwsSecretBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendrole" awssecretbackendrole.AwsSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -537,7 +537,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1023,7 +1023,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendrole" &awssecretbackendrole.AwsSecretBackendRoleConfig { Connection: interface{}, @@ -1065,7 +1065,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendrole" | Name | *string | Unique name for the role. | | DefaultStsTtl | *f64 | The default TTL in seconds for STS credentials. | | IamGroups | *[]*string | A list of IAM group names. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | MaxStsTtl | *f64 | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | Namespace | *string | Target namespace. (requires Enterprise). | | PermissionsBoundaryArn | *string | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1156,7 +1156,7 @@ Backend *string The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1170,7 +1170,7 @@ CredentialType *string Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1184,7 +1184,7 @@ Name *string Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1200,7 +1200,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1216,7 +1216,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1228,7 +1228,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1247,7 +1247,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1261,7 +1261,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1277,7 +1277,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1291,7 +1291,7 @@ PolicyArns *[]*string ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1305,7 +1305,7 @@ PolicyDocument *string IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1319,7 +1319,7 @@ RoleArns *[]*string ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1333,7 +1333,7 @@ UserPath *string The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendRole.java.md b/docs/awsSecretBackendRole.java.md index 253c357e..f92e9fe7 100644 --- a/docs/awsSecretBackendRole.java.md +++ b/docs/awsSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers @@ -55,7 +55,7 @@ AwsSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Unique name for the role. | | defaultStsTtl | java.lang.Number | The default TTL in seconds for STS credentials. | | iamGroups | java.util.List | A list of IAM group names. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | maxStsTtl | java.lang.Number | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | permissionsBoundaryArn | java.lang.String | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -164,7 +164,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -176,7 +176,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -199,7 +199,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -221,7 +221,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- @@ -758,7 +758,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1290,7 +1290,7 @@ AwsSecretBackendRoleConfig.builder() | name | java.lang.String | Unique name for the role. | | defaultStsTtl | java.lang.Number | The default TTL in seconds for STS credentials. | | iamGroups | java.util.List | A list of IAM group names. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | maxStsTtl | java.lang.Number | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | permissionsBoundaryArn | java.lang.String | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1381,7 +1381,7 @@ public java.lang.String getBackend(); The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1395,7 +1395,7 @@ public java.lang.String getCredentialType(); Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1409,7 +1409,7 @@ public java.lang.String getName(); Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1425,7 +1425,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1441,7 +1441,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1453,7 +1453,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1472,7 +1472,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1486,7 +1486,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1502,7 +1502,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1516,7 +1516,7 @@ public java.util.List getPolicyArns(); ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1530,7 +1530,7 @@ public java.lang.String getPolicyDocument(); IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1544,7 +1544,7 @@ public java.util.List getRoleArns(); ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1558,7 +1558,7 @@ public java.lang.String getUserPath(); The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendRole.python.md b/docs/awsSecretBackendRole.python.md index 55a0fa1e..965eb759 100644 --- a/docs/awsSecretBackendRole.python.md +++ b/docs/awsSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers @@ -53,7 +53,7 @@ awsSecretBackendRole.AwsSecretBackendRole( | name | str | Unique name for the role. | | default_sts_ttl | typing.Union[int, float] | The default TTL in seconds for STS credentials. | | iam_groups | typing.List[str] | A list of IAM group names. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | max_sts_ttl | typing.Union[int, float] | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | str | Target namespace. (requires Enterprise). | | permissions_boundary_arn | str | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -162,7 +162,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -174,7 +174,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -197,7 +197,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -219,7 +219,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- @@ -802,7 +802,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1330,7 +1330,7 @@ awsSecretBackendRole.AwsSecretBackendRoleConfig( | name | str | Unique name for the role. | | default_sts_ttl | typing.Union[int, float] | The default TTL in seconds for STS credentials. | | iam_groups | typing.List[str] | A list of IAM group names. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | max_sts_ttl | typing.Union[int, float] | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | str | Target namespace. (requires Enterprise). | | permissions_boundary_arn | str | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1421,7 +1421,7 @@ backend: str The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1435,7 +1435,7 @@ credential_type: str Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1449,7 +1449,7 @@ name: str Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1465,7 +1465,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1481,7 +1481,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1493,7 +1493,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1512,7 +1512,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1526,7 +1526,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1542,7 +1542,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1556,7 +1556,7 @@ policy_arns: typing.List[str] ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1570,7 +1570,7 @@ policy_document: str IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1584,7 +1584,7 @@ role_arns: typing.List[str] ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1598,7 +1598,7 @@ user_path: str The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendRole.typescript.md b/docs/awsSecretBackendRole.typescript.md index df776c77..a44c6024 100644 --- a/docs/awsSecretBackendRole.typescript.md +++ b/docs/awsSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers @@ -537,7 +537,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1044,7 +1044,7 @@ const awsSecretBackendRoleConfig: awsSecretBackendRole.AwsSecretBackendRoleConfi | name | string | Unique name for the role. | | defaultStsTtl | number | The default TTL in seconds for STS credentials. | | iamGroups | string[] | A list of IAM group names. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | maxStsTtl | number | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | string | Target namespace. (requires Enterprise). | | permissionsBoundaryArn | string | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1135,7 +1135,7 @@ public readonly backend: string; The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1149,7 +1149,7 @@ public readonly credentialType: string; Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1163,7 +1163,7 @@ public readonly name: string; Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1179,7 +1179,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1195,7 +1195,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1207,7 +1207,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1226,7 +1226,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1240,7 +1240,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1256,7 +1256,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1270,7 +1270,7 @@ public readonly policyArns: string[]; ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1284,7 +1284,7 @@ public readonly policyDocument: string; IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1298,7 +1298,7 @@ public readonly roleArns: string[]; ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1312,7 +1312,7 @@ public readonly userPath: string; The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendStaticRole.csharp.md b/docs/awsSecretBackendStaticRole.csharp.md index 179e0e81..a4c333e2 100644 --- a/docs/awsSecretBackendStaticRole.csharp.md +++ b/docs/awsSecretBackendStaticRole.csharp.md @@ -4,7 +4,7 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -854,7 +854,7 @@ new AwsSecretBackendStaticRoleConfig { | RotationPeriod | double | How often Vault should rotate the password of the user entry. | | Username | string | The username of the existing AWS IAM user to manage password rotation for. | | Backend | string | The path where the AWS secrets backend is mounted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ public string Name { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -953,7 +953,7 @@ public double RotationPeriod { get; set; } How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -967,7 +967,7 @@ public string Username { get; set; } The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -981,7 +981,7 @@ public string Backend { get; set; } The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -993,7 +993,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/awsSecretBackendStaticRole.go.md b/docs/awsSecretBackendStaticRole.go.md index d88f2906..4746efb6 100644 --- a/docs/awsSecretBackendStaticRole.go.md +++ b/docs/awsSecretBackendStaticRole.go.md @@ -4,12 +4,12 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendstaticrole" awssecretbackendstaticrole.NewAwsSecretBackendStaticRole(scope Construct, id *string, config AwsSecretBackendStaticRoleConfig) AwsSecretBackendStaticRole ``` @@ -399,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendstaticrole" awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendstaticrole" awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsTerraformElement(x inter ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendstaticrole" awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ awssecretbackendstaticrole.AwsSecretBackendStaticRole_IsTerraformResource(x inte ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendstaticrole" awssecretbackendstaticrole.AwsSecretBackendStaticRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -820,7 +820,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendstaticrole" &awssecretbackendstaticrole.AwsSecretBackendStaticRoleConfig { Connection: interface{}, @@ -854,7 +854,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/awssecretbackendstati | RotationPeriod | *f64 | How often Vault should rotate the password of the user entry. | | Username | *string | The username of the existing AWS IAM user to manage password rotation for. | | Backend | *string | The path where the AWS secrets backend is mounted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ Name *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -953,7 +953,7 @@ RotationPeriod *f64 How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -967,7 +967,7 @@ Username *string The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -981,7 +981,7 @@ Backend *string The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -993,7 +993,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/awsSecretBackendStaticRole.java.md b/docs/awsSecretBackendStaticRole.java.md index cea0d9aa..890c0feb 100644 --- a/docs/awsSecretBackendStaticRole.java.md +++ b/docs/awsSecretBackendStaticRole.java.md @@ -4,7 +4,7 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers @@ -47,7 +47,7 @@ AwsSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String id) | rotationPeriod | java.lang.Number | How often Vault should rotate the password of the user entry. | | username | java.lang.String | The username of the existing AWS IAM user to manage password rotation for. | | backend | java.lang.String | The path where the AWS secrets backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- @@ -617,7 +617,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -987,7 +987,7 @@ AwsSecretBackendStaticRoleConfig.builder() | rotationPeriod | java.lang.Number | How often Vault should rotate the password of the user entry. | | username | java.lang.String | The username of the existing AWS IAM user to manage password rotation for. | | backend | java.lang.String | The path where the AWS secrets backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1072,7 +1072,7 @@ public java.lang.String getName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -1086,7 +1086,7 @@ public java.lang.Number getRotationPeriod(); How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -1100,7 +1100,7 @@ public java.lang.String getUsername(); The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -1114,7 +1114,7 @@ public java.lang.String getBackend(); The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -1126,7 +1126,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1143,7 +1143,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/awsSecretBackendStaticRole.python.md b/docs/awsSecretBackendStaticRole.python.md index 0a98bad8..baf8996e 100644 --- a/docs/awsSecretBackendStaticRole.python.md +++ b/docs/awsSecretBackendStaticRole.python.md @@ -4,7 +4,7 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers @@ -45,7 +45,7 @@ awsSecretBackendStaticRole.AwsSecretBackendStaticRole( | rotation_period | typing.Union[int, float] | How often Vault should rotate the password of the user entry. | | username | str | The username of the existing AWS IAM user to manage password rotation for. | | backend | str | The path where the AWS secrets backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -1027,7 +1027,7 @@ awsSecretBackendStaticRole.AwsSecretBackendStaticRoleConfig( | rotation_period | typing.Union[int, float] | How often Vault should rotate the password of the user entry. | | username | str | The username of the existing AWS IAM user to manage password rotation for. | | backend | str | The path where the AWS secrets backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1112,7 +1112,7 @@ name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -1126,7 +1126,7 @@ rotation_period: typing.Union[int, float] How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -1140,7 +1140,7 @@ username: str The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -1154,7 +1154,7 @@ backend: str The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -1166,7 +1166,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/awsSecretBackendStaticRole.typescript.md b/docs/awsSecretBackendStaticRole.typescript.md index a5462128..2f5b7d0a 100644 --- a/docs/awsSecretBackendStaticRole.typescript.md +++ b/docs/awsSecretBackendStaticRole.typescript.md @@ -4,7 +4,7 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -840,7 +840,7 @@ const awsSecretBackendStaticRoleConfig: awsSecretBackendStaticRole.AwsSecretBack | rotationPeriod | number | How often Vault should rotate the password of the user entry. | | username | string | The username of the existing AWS IAM user to manage password rotation for. | | backend | string | The path where the AWS secrets backend is mounted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -925,7 +925,7 @@ public readonly name: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -939,7 +939,7 @@ public readonly rotationPeriod: number; How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -953,7 +953,7 @@ public readonly username: string; The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -967,7 +967,7 @@ public readonly backend: string; The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -979,7 +979,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -996,7 +996,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/azureAuthBackendConfig.csharp.md b/docs/azureAuthBackendConfig.csharp.md index a0bc5955..d63e098c 100644 --- a/docs/azureAuthBackendConfig.csharp.md +++ b/docs/azureAuthBackendConfig.csharp.md @@ -4,7 +4,7 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -923,7 +923,7 @@ new AzureAuthBackendConfigConfig { | ClientId | string | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | ClientSecret | string | The client secret for credentials to query the Azure APIs. | | Environment | string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -1008,7 +1008,7 @@ public string Resource { get; set; } The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1022,7 +1022,7 @@ public string TenantId { get; set; } The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1036,7 +1036,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1050,7 +1050,7 @@ public string ClientId { get; set; } The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1064,7 +1064,7 @@ public string ClientSecret { get; set; } The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1078,7 +1078,7 @@ public string Environment { get; set; } The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1090,7 +1090,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1107,7 +1107,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendConfig.go.md b/docs/azureAuthBackendConfig.go.md index c37a5e1f..91956162 100644 --- a/docs/azureAuthBackendConfig.go.md +++ b/docs/azureAuthBackendConfig.go.md @@ -4,12 +4,12 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendconfig" azureauthbackendconfig.NewAzureAuthBackendConfig(scope Construct, id *string, config AzureAuthBackendConfigConfig) AzureAuthBackendConfig ``` @@ -420,7 +420,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendconfig" azureauthbackendconfig.AzureAuthBackendConfig_IsConstruct(x interface{}) *bool ``` @@ -452,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendconfig" azureauthbackendconfig.AzureAuthBackendConfig_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +466,7 @@ azureauthbackendconfig.AzureAuthBackendConfig_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendconfig" azureauthbackendconfig.AzureAuthBackendConfig_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +480,7 @@ azureauthbackendconfig.AzureAuthBackendConfig_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendconfig" azureauthbackendconfig.AzureAuthBackendConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +509,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -885,7 +885,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendconfig" &azureauthbackendconfig.AzureAuthBackendConfigConfig { Connection: interface{}, @@ -923,7 +923,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendconfi | ClientId | *string | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | ClientSecret | *string | The client secret for credentials to query the Azure APIs. | | Environment | *string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -1008,7 +1008,7 @@ Resource *string The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1022,7 +1022,7 @@ TenantId *string The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1036,7 +1036,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1050,7 +1050,7 @@ ClientId *string The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1064,7 +1064,7 @@ ClientSecret *string The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1078,7 +1078,7 @@ Environment *string The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1090,7 +1090,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1107,7 +1107,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendConfig.java.md b/docs/azureAuthBackendConfig.java.md index ed0c32a6..502cf844 100644 --- a/docs/azureAuthBackendConfig.java.md +++ b/docs/azureAuthBackendConfig.java.md @@ -4,7 +4,7 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers @@ -51,7 +51,7 @@ AzureAuthBackendConfig.Builder.create(Construct scope, java.lang.String id) | clientId | java.lang.String | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | clientSecret | java.lang.String | The client secret for credentials to query the Azure APIs. | | environment | java.lang.String | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -193,7 +193,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- @@ -662,7 +662,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -1080,7 +1080,7 @@ AzureAuthBackendConfigConfig.builder() | clientId | java.lang.String | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | clientSecret | java.lang.String | The client secret for credentials to query the Azure APIs. | | environment | java.lang.String | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1165,7 +1165,7 @@ public java.lang.String getResource(); The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1179,7 +1179,7 @@ public java.lang.String getTenantId(); The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1193,7 +1193,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1207,7 +1207,7 @@ public java.lang.String getClientId(); The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1221,7 +1221,7 @@ public java.lang.String getClientSecret(); The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1235,7 +1235,7 @@ public java.lang.String getEnvironment(); The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1247,7 +1247,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1264,7 +1264,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendConfig.python.md b/docs/azureAuthBackendConfig.python.md index aa83cf18..51673784 100644 --- a/docs/azureAuthBackendConfig.python.md +++ b/docs/azureAuthBackendConfig.python.md @@ -4,7 +4,7 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers @@ -49,7 +49,7 @@ azureAuthBackendConfig.AzureAuthBackendConfig( | client_id | str | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | client_secret | str | The client secret for credentials to query the Azure APIs. | | environment | str | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- @@ -706,7 +706,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -1120,7 +1120,7 @@ azureAuthBackendConfig.AzureAuthBackendConfigConfig( | client_id | str | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | client_secret | str | The client secret for credentials to query the Azure APIs. | | environment | str | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1205,7 +1205,7 @@ resource: str The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1219,7 +1219,7 @@ tenant_id: str The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1233,7 +1233,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1247,7 +1247,7 @@ client_id: str The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1261,7 +1261,7 @@ client_secret: str The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1275,7 +1275,7 @@ environment: str The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1287,7 +1287,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1304,7 +1304,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendConfig.typescript.md b/docs/azureAuthBackendConfig.typescript.md index 7e8f0793..a711176e 100644 --- a/docs/azureAuthBackendConfig.typescript.md +++ b/docs/azureAuthBackendConfig.typescript.md @@ -4,7 +4,7 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -907,7 +907,7 @@ const azureAuthBackendConfigConfig: azureAuthBackendConfig.AzureAuthBackendConfi | clientId | string | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | clientSecret | string | The client secret for credentials to query the Azure APIs. | | environment | string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -992,7 +992,7 @@ public readonly resource: string; The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1006,7 +1006,7 @@ public readonly tenantId: string; The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1020,7 +1020,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1034,7 +1034,7 @@ public readonly clientId: string; The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1048,7 +1048,7 @@ public readonly clientSecret: string; The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1062,7 +1062,7 @@ public readonly environment: string; The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1074,7 +1074,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1091,7 +1091,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendRole.csharp.md b/docs/azureAuthBackendRole.csharp.md index acbe7bda..6247f865 100644 --- a/docs/azureAuthBackendRole.csharp.md +++ b/docs/azureAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1262,7 +1262,7 @@ new AzureAuthBackendRoleConfig { | BoundScaleSets | string[] | The list of scale set names that the login is restricted to. | | BoundServicePrincipalIds | string[] | The list of Service Principal IDs that login is restricted to. | | BoundSubscriptionIds | string[] | The list of subscription IDs that login is restricted to. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1356,7 +1356,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1370,7 +1370,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1384,7 +1384,7 @@ public string[] BoundGroupIds { get; set; } The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1398,7 +1398,7 @@ public string[] BoundLocations { get; set; } The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1412,7 +1412,7 @@ public string[] BoundResourceGroups { get; set; } The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1426,7 +1426,7 @@ public string[] BoundScaleSets { get; set; } The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1440,7 +1440,7 @@ public string[] BoundServicePrincipalIds { get; set; } The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1454,7 +1454,7 @@ public string[] BoundSubscriptionIds { get; set; } The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1466,7 +1466,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1483,7 +1483,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1497,7 +1497,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1511,7 +1511,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1525,7 +1525,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1539,7 +1539,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1553,7 +1553,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1567,7 +1567,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1581,7 +1581,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1595,7 +1595,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1609,7 +1609,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureAuthBackendRole.go.md b/docs/azureAuthBackendRole.go.md index 8dce4f5b..dba15448 100644 --- a/docs/azureAuthBackendRole.go.md +++ b/docs/azureAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendrole" azureauthbackendrole.NewAzureAuthBackendRole(scope Construct, id *string, config AzureAuthBackendRoleConfig) AzureAuthBackendRole ``` @@ -504,7 +504,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendrole" azureauthbackendrole.AzureAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -536,7 +536,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendrole" azureauthbackendrole.AzureAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -550,7 +550,7 @@ azureauthbackendrole.AzureAuthBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendrole" azureauthbackendrole.AzureAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -564,7 +564,7 @@ azureauthbackendrole.AzureAuthBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendrole" azureauthbackendrole.AzureAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -593,7 +593,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1211,7 +1211,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendrole" &azureauthbackendrole.AzureAuthBackendRoleConfig { Connection: interface{}, @@ -1262,7 +1262,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azureauthbackendrole" | BoundScaleSets | *[]*string | The list of scale set names that the login is restricted to. | | BoundServicePrincipalIds | *[]*string | The list of Service Principal IDs that login is restricted to. | | BoundSubscriptionIds | *[]*string | The list of subscription IDs that login is restricted to. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1356,7 +1356,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1370,7 +1370,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1384,7 +1384,7 @@ BoundGroupIds *[]*string The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1398,7 +1398,7 @@ BoundLocations *[]*string The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1412,7 +1412,7 @@ BoundResourceGroups *[]*string The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1426,7 +1426,7 @@ BoundScaleSets *[]*string The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1440,7 +1440,7 @@ BoundServicePrincipalIds *[]*string The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1454,7 +1454,7 @@ BoundSubscriptionIds *[]*string The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1466,7 +1466,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1483,7 +1483,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1497,7 +1497,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1511,7 +1511,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1525,7 +1525,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1539,7 +1539,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1553,7 +1553,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1567,7 +1567,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1581,7 +1581,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1595,7 +1595,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1609,7 +1609,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureAuthBackendRole.java.md b/docs/azureAuthBackendRole.java.md index 9c303dc8..43d5d57f 100644 --- a/docs/azureAuthBackendRole.java.md +++ b/docs/azureAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers @@ -65,7 +65,7 @@ AzureAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | boundScaleSets | java.util.List | The list of scale set names that the login is restricted to. | | boundServicePrincipalIds | java.util.List | The list of Service Principal IDs that login is restricted to. | | boundSubscriptionIds | java.util.List | The list of subscription IDs that login is restricted to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -145,7 +145,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -236,7 +236,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -326,7 +326,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- @@ -879,7 +879,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1553,7 +1553,7 @@ AzureAuthBackendRoleConfig.builder() | boundScaleSets | java.util.List | The list of scale set names that the login is restricted to. | | boundServicePrincipalIds | java.util.List | The list of Service Principal IDs that login is restricted to. | | boundSubscriptionIds | java.util.List | The list of subscription IDs that login is restricted to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1647,7 +1647,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1661,7 +1661,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1675,7 +1675,7 @@ public java.util.List getBoundGroupIds(); The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1689,7 +1689,7 @@ public java.util.List getBoundLocations(); The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1703,7 +1703,7 @@ public java.util.List getBoundResourceGroups(); The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1717,7 +1717,7 @@ public java.util.List getBoundScaleSets(); The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1731,7 +1731,7 @@ public java.util.List getBoundServicePrincipalIds(); The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1745,7 +1745,7 @@ public java.util.List getBoundSubscriptionIds(); The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1757,7 +1757,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1774,7 +1774,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1788,7 +1788,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1802,7 +1802,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1816,7 +1816,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1830,7 +1830,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1844,7 +1844,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1858,7 +1858,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1872,7 +1872,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1886,7 +1886,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1900,7 +1900,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureAuthBackendRole.python.md b/docs/azureAuthBackendRole.python.md index 7501cf42..8105832b 100644 --- a/docs/azureAuthBackendRole.python.md +++ b/docs/azureAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers @@ -62,7 +62,7 @@ azureAuthBackendRole.AzureAuthBackendRole( | bound_scale_sets | typing.List[str] | The list of scale set names that the login is restricted to. | | bound_service_principal_ids | typing.List[str] | The list of Service Principal IDs that login is restricted to. | | bound_subscription_ids | typing.List[str] | The list of subscription IDs that login is restricted to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -142,7 +142,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -233,7 +233,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- @@ -922,7 +922,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1591,7 +1591,7 @@ azureAuthBackendRole.AzureAuthBackendRoleConfig( | bound_scale_sets | typing.List[str] | The list of scale set names that the login is restricted to. | | bound_service_principal_ids | typing.List[str] | The list of Service Principal IDs that login is restricted to. | | bound_subscription_ids | typing.List[str] | The list of subscription IDs that login is restricted to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1685,7 +1685,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1699,7 +1699,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1713,7 +1713,7 @@ bound_group_ids: typing.List[str] The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1727,7 +1727,7 @@ bound_locations: typing.List[str] The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1741,7 +1741,7 @@ bound_resource_groups: typing.List[str] The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1755,7 +1755,7 @@ bound_scale_sets: typing.List[str] The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1769,7 +1769,7 @@ bound_service_principal_ids: typing.List[str] The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1783,7 +1783,7 @@ bound_subscription_ids: typing.List[str] The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1795,7 +1795,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1812,7 +1812,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1826,7 +1826,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1840,7 +1840,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1854,7 +1854,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1868,7 +1868,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1882,7 +1882,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1896,7 +1896,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1910,7 +1910,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1924,7 +1924,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1938,7 +1938,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureAuthBackendRole.typescript.md b/docs/azureAuthBackendRole.typescript.md index 1fd6d272..4d86fea8 100644 --- a/docs/azureAuthBackendRole.typescript.md +++ b/docs/azureAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1235,7 +1235,7 @@ const azureAuthBackendRoleConfig: azureAuthBackendRole.AzureAuthBackendRoleConfi | boundScaleSets | string[] | The list of scale set names that the login is restricted to. | | boundServicePrincipalIds | string[] | The list of Service Principal IDs that login is restricted to. | | boundSubscriptionIds | string[] | The list of subscription IDs that login is restricted to. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1329,7 +1329,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1343,7 +1343,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1357,7 +1357,7 @@ public readonly boundGroupIds: string[]; The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1371,7 +1371,7 @@ public readonly boundLocations: string[]; The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1385,7 +1385,7 @@ public readonly boundResourceGroups: string[]; The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1399,7 +1399,7 @@ public readonly boundScaleSets: string[]; The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1413,7 +1413,7 @@ public readonly boundServicePrincipalIds: string[]; The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1427,7 +1427,7 @@ public readonly boundSubscriptionIds: string[]; The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1439,7 +1439,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1456,7 +1456,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1470,7 +1470,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1484,7 +1484,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1498,7 +1498,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1512,7 +1512,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1526,7 +1526,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1540,7 +1540,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1554,7 +1554,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1568,7 +1568,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1582,7 +1582,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureSecretBackend.csharp.md b/docs/azureSecretBackend.csharp.md index 6cf67d90..8ea79c38 100644 --- a/docs/azureSecretBackend.csharp.md +++ b/docs/azureSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1014,7 +1014,7 @@ new AzureSecretBackendConfig { | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | | Environment | string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | Path to mount the backend at. | | UseMicrosoftGraphApi | object | Use the Microsoft Graph API. Should be set to true on vault-1.10+. | @@ -1101,7 +1101,7 @@ public string SubscriptionId { get; set; } The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1115,7 +1115,7 @@ public string TenantId { get; set; } The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1129,7 +1129,7 @@ public string ClientId { get; set; } The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1143,7 +1143,7 @@ public string ClientSecret { get; set; } The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1157,7 +1157,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1171,7 +1171,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1185,7 +1185,7 @@ public string Environment { get; set; } The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1197,7 +1197,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1214,7 +1214,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1228,7 +1228,7 @@ public string Path { get; set; } Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1242,7 +1242,7 @@ public object UseMicrosoftGraphApi { get; set; } Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackend.go.md b/docs/azureSecretBackend.go.md index 3378773e..a4e8542e 100644 --- a/docs/azureSecretBackend.go.md +++ b/docs/azureSecretBackend.go.md @@ -4,12 +4,12 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackend" azuresecretbackend.NewAzureSecretBackend(scope Construct, id *string, config AzureSecretBackendConfig) AzureSecretBackend ``` @@ -441,7 +441,7 @@ func ResetUseMicrosoftGraphApi() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackend" azuresecretbackend.AzureSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -473,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackend" azuresecretbackend.AzureSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +487,7 @@ azuresecretbackend.AzureSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackend" azuresecretbackend.AzureSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +501,7 @@ azuresecretbackend.AzureSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackend" azuresecretbackend.AzureSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -530,7 +530,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -972,7 +972,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackend" &azuresecretbackend.AzureSecretBackendConfig { Connection: interface{}, @@ -1014,7 +1014,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackend" | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | | Environment | *string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | Path to mount the backend at. | | UseMicrosoftGraphApi | interface{} | Use the Microsoft Graph API. Should be set to true on vault-1.10+. | @@ -1101,7 +1101,7 @@ SubscriptionId *string The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1115,7 +1115,7 @@ TenantId *string The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1129,7 +1129,7 @@ ClientId *string The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1143,7 +1143,7 @@ ClientSecret *string The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1157,7 +1157,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1171,7 +1171,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1185,7 +1185,7 @@ Environment *string The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1197,7 +1197,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1214,7 +1214,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1228,7 +1228,7 @@ Path *string Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1242,7 +1242,7 @@ UseMicrosoftGraphApi interface{} Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackend.java.md b/docs/azureSecretBackend.java.md index 6981a270..d80d55f5 100644 --- a/docs/azureSecretBackend.java.md +++ b/docs/azureSecretBackend.java.md @@ -4,7 +4,7 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers @@ -57,7 +57,7 @@ AzureSecretBackend.Builder.create(Construct scope, java.lang.String id) | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | environment | java.lang.String | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path to mount the backend at. | | useMicrosoftGraphApi | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use the Microsoft Graph API. Should be set to true on vault-1.10+. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -211,7 +211,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- @@ -721,7 +721,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1211,7 +1211,7 @@ AzureSecretBackendConfig.builder() | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | environment | java.lang.String | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path to mount the backend at. | | useMicrosoftGraphApi | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use the Microsoft Graph API. Should be set to true on vault-1.10+. | @@ -1298,7 +1298,7 @@ public java.lang.String getSubscriptionId(); The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1312,7 +1312,7 @@ public java.lang.String getTenantId(); The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1326,7 +1326,7 @@ public java.lang.String getClientId(); The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1340,7 +1340,7 @@ public java.lang.String getClientSecret(); The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1354,7 +1354,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1368,7 +1368,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1382,7 +1382,7 @@ public java.lang.String getEnvironment(); The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1394,7 +1394,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1411,7 +1411,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1425,7 +1425,7 @@ public java.lang.String getPath(); Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1439,7 +1439,7 @@ public java.lang.Object getUseMicrosoftGraphApi(); Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackend.python.md b/docs/azureSecretBackend.python.md index 62e04828..6d760c62 100644 --- a/docs/azureSecretBackend.python.md +++ b/docs/azureSecretBackend.python.md @@ -4,7 +4,7 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers @@ -53,7 +53,7 @@ azureSecretBackend.AzureSecretBackend( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | environment | str | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path to mount the backend at. | | use_microsoft_graph_api | typing.Union[bool, cdktf.IResolvable] | Use the Microsoft Graph API. Should be set to true on vault-1.10+. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -207,7 +207,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- @@ -763,7 +763,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1247,7 +1247,7 @@ azureSecretBackend.AzureSecretBackendConfig( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | environment | str | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path to mount the backend at. | | use_microsoft_graph_api | typing.Union[bool, cdktf.IResolvable] | Use the Microsoft Graph API. Should be set to true on vault-1.10+. | @@ -1334,7 +1334,7 @@ subscription_id: str The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1348,7 +1348,7 @@ tenant_id: str The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1362,7 +1362,7 @@ client_id: str The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1376,7 +1376,7 @@ client_secret: str The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1390,7 +1390,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1404,7 +1404,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1418,7 +1418,7 @@ environment: str The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1430,7 +1430,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1447,7 +1447,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1461,7 +1461,7 @@ path: str Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1475,7 +1475,7 @@ use_microsoft_graph_api: typing.Union[bool, IResolvable] Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackend.typescript.md b/docs/azureSecretBackend.typescript.md index c525d6f2..b65f15c5 100644 --- a/docs/azureSecretBackend.typescript.md +++ b/docs/azureSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -995,7 +995,7 @@ const azureSecretBackendConfig: azureSecretBackend.AzureSecretBackendConfig = { | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | | environment | string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | Path to mount the backend at. | | useMicrosoftGraphApi | boolean \| cdktf.IResolvable | Use the Microsoft Graph API. Should be set to true on vault-1.10+. | @@ -1082,7 +1082,7 @@ public readonly subscriptionId: string; The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1096,7 +1096,7 @@ public readonly tenantId: string; The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1110,7 +1110,7 @@ public readonly clientId: string; The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1124,7 +1124,7 @@ public readonly clientSecret: string; The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1138,7 +1138,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1152,7 +1152,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1166,7 +1166,7 @@ public readonly environment: string; The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1178,7 +1178,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1195,7 +1195,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1209,7 +1209,7 @@ public readonly path: string; Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1223,7 +1223,7 @@ public readonly useMicrosoftGraphApi: boolean | IResolvable; Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackendRole.csharp.md b/docs/azureSecretBackendRole.csharp.md index 6dc439c7..b1591f1a 100644 --- a/docs/azureSecretBackendRole.csharp.md +++ b/docs/azureSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers @@ -577,7 +577,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1074,7 +1074,7 @@ new AzureSecretBackendRoleAzureGroups { | **Name** | **Type** | **Description** | | --- | --- | --- | -| GroupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| GroupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1086,7 +1086,7 @@ public string GroupName { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1108,9 +1108,9 @@ new AzureSecretBackendRoleAzureRoles { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Scope | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| RoleId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| RoleName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| Scope | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| RoleId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| RoleName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1122,7 +1122,7 @@ public string Scope { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1134,7 +1134,7 @@ public string RoleId { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1146,7 +1146,7 @@ public string RoleName { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1198,7 +1198,7 @@ new AzureSecretBackendRoleConfig { | AzureRoles | object | azure_roles block. | | Backend | string | Unique name of the auth backend to configure. | | Description | string | Human-friendly description of the mount for the backend. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | MaxTtl | string | Human-friendly description of the mount for the backend. | | Namespace | string | Target namespace. (requires Enterprise). | | PermanentlyDelete | object | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1288,7 +1288,7 @@ public string Role { get; set; } Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1302,7 +1302,7 @@ public string ApplicationObjectId { get; set; } Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1316,7 +1316,7 @@ public object AzureGroups { get; set; } azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1330,7 +1330,7 @@ public object AzureRoles { get; set; } azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1344,7 +1344,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1358,7 +1358,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1370,7 +1370,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1387,7 +1387,7 @@ public string MaxTtl { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1401,7 +1401,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1415,7 +1415,7 @@ public object PermanentlyDelete { get; set; } Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1431,7 +1431,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1445,7 +1445,7 @@ public string[] Tags { get; set; } Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1459,7 +1459,7 @@ public string Ttl { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- diff --git a/docs/azureSecretBackendRole.go.md b/docs/azureSecretBackendRole.go.md index afe85aca..b015baf5 100644 --- a/docs/azureSecretBackendRole.go.md +++ b/docs/azureSecretBackendRole.go.md @@ -4,12 +4,12 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRole(scope Construct, id *string, config AzureSecretBackendRoleConfig) AzureSecretBackendRole ``` @@ -488,7 +488,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" azuresecretbackendrole.AzureSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -520,7 +520,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" azuresecretbackendrole.AzureSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -534,7 +534,7 @@ azuresecretbackendrole.AzureSecretBackendRole_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" azuresecretbackendrole.AzureSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -548,7 +548,7 @@ azuresecretbackendrole.AzureSecretBackendRole_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" azuresecretbackendrole.AzureSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -577,7 +577,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1063,7 +1063,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" &azuresecretbackendrole.AzureSecretBackendRoleAzureGroups { GroupName: *string, @@ -1074,7 +1074,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrol | **Name** | **Type** | **Description** | | --- | --- | --- | -| GroupName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| GroupName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1086,7 +1086,7 @@ GroupName *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1095,7 +1095,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" &azuresecretbackendrole.AzureSecretBackendRoleAzureRoles { Scope: *string, @@ -1108,9 +1108,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrol | **Name** | **Type** | **Description** | | --- | --- | --- | -| Scope | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| RoleId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| RoleName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| Scope | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| RoleId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| RoleName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1122,7 +1122,7 @@ Scope *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1134,7 +1134,7 @@ RoleId *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1146,7 +1146,7 @@ RoleName *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1155,7 +1155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" &azuresecretbackendrole.AzureSecretBackendRoleConfig { Connection: interface{}, @@ -1198,7 +1198,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrol | AzureRoles | interface{} | azure_roles block. | | Backend | *string | Unique name of the auth backend to configure. | | Description | *string | Human-friendly description of the mount for the backend. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | MaxTtl | *string | Human-friendly description of the mount for the backend. | | Namespace | *string | Target namespace. (requires Enterprise). | | PermanentlyDelete | interface{} | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1288,7 +1288,7 @@ Role *string Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1302,7 +1302,7 @@ ApplicationObjectId *string Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1316,7 +1316,7 @@ AzureGroups interface{} azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1330,7 +1330,7 @@ AzureRoles interface{} azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1344,7 +1344,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1358,7 +1358,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1370,7 +1370,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1387,7 +1387,7 @@ MaxTtl *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1401,7 +1401,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1415,7 +1415,7 @@ PermanentlyDelete interface{} Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1431,7 +1431,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1445,7 +1445,7 @@ Tags *[]*string Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1459,7 +1459,7 @@ Ttl *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- @@ -1470,7 +1470,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRoleAzureGroupsList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) AzureSecretBackendRoleAzureGroupsList ``` @@ -1630,7 +1630,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRoleAzureGroupsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) AzureSecretBackendRoleAzureGroupsOutputReference ``` @@ -1930,7 +1930,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRoleAzureRolesList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) AzureSecretBackendRoleAzureRolesList ``` @@ -2090,7 +2090,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/azuresecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrole" azuresecretbackendrole.NewAzureSecretBackendRoleAzureRolesOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) AzureSecretBackendRoleAzureRolesOutputReference ``` diff --git a/docs/azureSecretBackendRole.java.md b/docs/azureSecretBackendRole.java.md index e657604d..ae96b841 100644 --- a/docs/azureSecretBackendRole.java.md +++ b/docs/azureSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers @@ -59,7 +59,7 @@ AzureSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | azureRoles | com.hashicorp.cdktf.IResolvable OR java.util.List<AzureSecretBackendRoleAzureRoles> | azure_roles block. | | backend | java.lang.String | Unique name of the auth backend to configure. | | description | java.lang.String | Human-friendly description of the mount for the backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | maxTtl | java.lang.String | Human-friendly description of the mount for the backend. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | permanentlyDelete | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -206,7 +206,7 @@ If you experience problems setting this value it might not be settable. Please t Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -238,7 +238,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- @@ -795,7 +795,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1292,7 +1292,7 @@ AzureSecretBackendRoleAzureGroups.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| groupName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| groupName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1304,7 +1304,7 @@ public java.lang.String getGroupName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1326,9 +1326,9 @@ AzureSecretBackendRoleAzureRoles.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| scope | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| roleId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| roleName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| scope | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| roleId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| roleName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1340,7 +1340,7 @@ public java.lang.String getScope(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1352,7 +1352,7 @@ public java.lang.String getRoleId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1364,7 +1364,7 @@ public java.lang.String getRoleName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1423,7 +1423,7 @@ AzureSecretBackendRoleConfig.builder() | azureRoles | com.hashicorp.cdktf.IResolvable OR java.util.List<AzureSecretBackendRoleAzureRoles> | azure_roles block. | | backend | java.lang.String | Unique name of the auth backend to configure. | | description | java.lang.String | Human-friendly description of the mount for the backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | maxTtl | java.lang.String | Human-friendly description of the mount for the backend. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | permanentlyDelete | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1513,7 +1513,7 @@ public java.lang.String getRole(); Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1527,7 +1527,7 @@ public java.lang.String getApplicationObjectId(); Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1541,7 +1541,7 @@ public java.lang.Object getAzureGroups(); azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1555,7 +1555,7 @@ public java.lang.Object getAzureRoles(); azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1569,7 +1569,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1583,7 +1583,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1595,7 +1595,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1612,7 +1612,7 @@ public java.lang.String getMaxTtl(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1626,7 +1626,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1640,7 +1640,7 @@ public java.lang.Object getPermanentlyDelete(); Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1656,7 +1656,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1670,7 +1670,7 @@ public java.util.List getTags(); Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1684,7 +1684,7 @@ public java.lang.String getTtl(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- diff --git a/docs/azureSecretBackendRole.python.md b/docs/azureSecretBackendRole.python.md index 3845b50d..b168cd90 100644 --- a/docs/azureSecretBackendRole.python.md +++ b/docs/azureSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers @@ -54,7 +54,7 @@ azureSecretBackendRole.AzureSecretBackendRole( | azure_roles | typing.Union[cdktf.IResolvable, typing.List[AzureSecretBackendRoleAzureRoles]] | azure_roles block. | | backend | str | Unique name of the auth backend to configure. | | description | str | Human-friendly description of the mount for the backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | max_ttl | str | Human-friendly description of the mount for the backend. | | namespace | str | Target namespace. (requires Enterprise). | | permanently_delete | typing.Union[bool, cdktf.IResolvable] | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -233,7 +233,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- @@ -840,7 +840,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1337,7 +1337,7 @@ azureSecretBackendRole.AzureSecretBackendRoleAzureGroups( | **Name** | **Type** | **Description** | | --- | --- | --- | -| group_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| group_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1349,7 +1349,7 @@ group_name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1371,9 +1371,9 @@ azureSecretBackendRole.AzureSecretBackendRoleAzureRoles( | **Name** | **Type** | **Description** | | --- | --- | --- | -| scope | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| role_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| role_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| scope | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| role_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| role_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1385,7 +1385,7 @@ scope: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1397,7 +1397,7 @@ role_id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1409,7 +1409,7 @@ role_name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1461,7 +1461,7 @@ azureSecretBackendRole.AzureSecretBackendRoleConfig( | azure_roles | typing.Union[cdktf.IResolvable, typing.List[AzureSecretBackendRoleAzureRoles]] | azure_roles block. | | backend | str | Unique name of the auth backend to configure. | | description | str | Human-friendly description of the mount for the backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | max_ttl | str | Human-friendly description of the mount for the backend. | | namespace | str | Target namespace. (requires Enterprise). | | permanently_delete | typing.Union[bool, cdktf.IResolvable] | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1551,7 +1551,7 @@ role: str Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1565,7 +1565,7 @@ application_object_id: str Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1579,7 +1579,7 @@ azure_groups: typing.Union[IResolvable, typing.List[AzureSecretBackendRoleAzureG azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1593,7 +1593,7 @@ azure_roles: typing.Union[IResolvable, typing.List[AzureSecretBackendRoleAzureRo azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1607,7 +1607,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1621,7 +1621,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1633,7 +1633,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1650,7 +1650,7 @@ max_ttl: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1664,7 +1664,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1678,7 +1678,7 @@ permanently_delete: typing.Union[bool, IResolvable] Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1694,7 +1694,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1708,7 +1708,7 @@ tags: typing.List[str] Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1722,7 +1722,7 @@ ttl: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- diff --git a/docs/azureSecretBackendRole.typescript.md b/docs/azureSecretBackendRole.typescript.md index 783c1d4f..b414a2d8 100644 --- a/docs/azureSecretBackendRole.typescript.md +++ b/docs/azureSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers @@ -577,7 +577,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1072,7 +1072,7 @@ const azureSecretBackendRoleAzureGroups: azureSecretBackendRole.AzureSecretBacke | **Name** | **Type** | **Description** | | --- | --- | --- | -| groupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| groupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1084,7 +1084,7 @@ public readonly groupName: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1102,9 +1102,9 @@ const azureSecretBackendRoleAzureRoles: azureSecretBackendRole.AzureSecretBacken | **Name** | **Type** | **Description** | | --- | --- | --- | -| scope | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| roleId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| roleName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| scope | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| roleId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| roleName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1116,7 +1116,7 @@ public readonly scope: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1128,7 +1128,7 @@ public readonly roleId: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1140,7 +1140,7 @@ public readonly roleName: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1171,7 +1171,7 @@ const azureSecretBackendRoleConfig: azureSecretBackendRole.AzureSecretBackendRol | azureRoles | cdktf.IResolvable \| AzureSecretBackendRoleAzureRoles[] | azure_roles block. | | backend | string | Unique name of the auth backend to configure. | | description | string | Human-friendly description of the mount for the backend. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | maxTtl | string | Human-friendly description of the mount for the backend. | | namespace | string | Target namespace. (requires Enterprise). | | permanentlyDelete | boolean \| cdktf.IResolvable | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1261,7 +1261,7 @@ public readonly role: string; Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1275,7 +1275,7 @@ public readonly applicationObjectId: string; Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1289,7 +1289,7 @@ public readonly azureGroups: IResolvable | AzureSecretBackendRoleAzureGroups[]; azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1303,7 +1303,7 @@ public readonly azureRoles: IResolvable | AzureSecretBackendRoleAzureRoles[]; azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1317,7 +1317,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1331,7 +1331,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1343,7 +1343,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1360,7 +1360,7 @@ public readonly maxTtl: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1374,7 +1374,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1388,7 +1388,7 @@ public readonly permanentlyDelete: boolean | IResolvable; Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1404,7 +1404,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1418,7 +1418,7 @@ public readonly tags: string[]; Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1432,7 +1432,7 @@ public readonly ttl: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- diff --git a/docs/certAuthBackendRole.csharp.md b/docs/certAuthBackendRole.csharp.md index 174340ff..6e8da7f5 100644 --- a/docs/certAuthBackendRole.csharp.md +++ b/docs/certAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers @@ -78,7 +78,6 @@ Must be unique amongst siblings in the same scope | ResetAllowedEmailSans | *No description.* | | ResetAllowedNames | *No description.* | | ResetAllowedOrganizationalUnits | *No description.* | -| ResetAllowedOrganizationUnits | *No description.* | | ResetAllowedUriSans | *No description.* | | ResetBackend | *No description.* | | ResetDisplayName | *No description.* | @@ -420,12 +419,6 @@ private void ResetAllowedNames() private void ResetAllowedOrganizationalUnits() ``` -##### `ResetAllowedOrganizationUnits` - -```csharp -private void ResetAllowedOrganizationUnits() -``` - ##### `ResetAllowedUriSans` ```csharp @@ -649,7 +642,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -684,7 +677,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | AllowedEmailSansInput | string[] | *No description.* | | AllowedNamesInput | string[] | *No description.* | | AllowedOrganizationalUnitsInput | string[] | *No description.* | -| AllowedOrganizationUnitsInput | string[] | *No description.* | | AllowedUriSansInput | string[] | *No description.* | | BackendInput | string | *No description.* | | CertificateInput | string | *No description.* | @@ -712,7 +704,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | AllowedEmailSans | string[] | *No description.* | | AllowedNames | string[] | *No description.* | | AllowedOrganizationalUnits | string[] | *No description.* | -| AllowedOrganizationUnits | string[] | *No description.* | | AllowedUriSans | string[] | *No description.* | | Backend | string | *No description.* | | Certificate | string | *No description.* | @@ -930,16 +921,6 @@ public string[] AllowedOrganizationalUnitsInput { get; } --- -##### `AllowedOrganizationUnitsInput`Optional - -```csharp -public string[] AllowedOrganizationUnitsInput { get; } -``` - -- *Type:* string[] - ---- - ##### `AllowedUriSansInput`Optional ```csharp @@ -1210,16 +1191,6 @@ public string[] AllowedOrganizationalUnits { get; } --- -##### `AllowedOrganizationUnits`Required - -```csharp -public string[] AllowedOrganizationUnits { get; } -``` - -- *Type:* string[] - ---- - ##### `AllowedUriSans`Required ```csharp @@ -1482,7 +1453,6 @@ new CertAuthBackendRoleConfig { string[] AllowedEmailSans = null, string[] AllowedNames = null, string[] AllowedOrganizationalUnits = null, - string[] AllowedOrganizationUnits = null, string[] AllowedUriSans = null, string Backend = null, string DisplayName = null, @@ -1517,25 +1487,24 @@ new CertAuthBackendRoleConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| Name | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| AllowedCommonNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| AllowedDnsSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| AllowedEmailSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| AllowedNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| AllowedOrganizationalUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| AllowedOrganizationUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. | -| AllowedUriSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| DisplayName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| Certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| Name | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| AllowedCommonNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| AllowedDnsSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| AllowedEmailSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| AllowedNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| AllowedOrganizationalUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| AllowedUriSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| DisplayName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | OcspCaCertificates | string | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | OcspEnabled | object | If enabled, validate certificates' revocation status using OCSP. | | OcspFailOpen | object | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | OcspQueryAllServers | object | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | OcspServersOverride | string[] | A comma-separated list of OCSP server addresses. | -| RequiredExtensions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| RequiredExtensions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | | TokenMaxTtl | double | The maximum lifetime of the generated token. | @@ -1626,7 +1595,7 @@ public string Certificate { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -1638,7 +1607,7 @@ public string Name { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -1650,7 +1619,7 @@ public string[] AllowedCommonNames { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -1662,7 +1631,7 @@ public string[] AllowedDnsSans { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -1674,7 +1643,7 @@ public string[] AllowedEmailSans { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -1686,7 +1655,7 @@ public string[] AllowedNames { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -1698,19 +1667,7 @@ public string[] AllowedOrganizationalUnits { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. - ---- - -##### `AllowedOrganizationUnits`Optional - -```csharp -public string[] AllowedOrganizationUnits { get; set; } -``` - -- *Type:* string[] - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -1722,7 +1679,7 @@ public string[] AllowedUriSans { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -1734,7 +1691,7 @@ public string Backend { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -1746,7 +1703,7 @@ public string DisplayName { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -1758,7 +1715,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1775,7 +1732,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -1789,7 +1746,7 @@ public string OcspCaCertificates { get; set; } Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -1803,7 +1760,7 @@ public object OcspEnabled { get; set; } If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -1817,7 +1774,7 @@ public object OcspFailOpen { get; set; } If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -1831,7 +1788,7 @@ public object OcspQueryAllServers { get; set; } If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -1847,7 +1804,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -1859,7 +1816,7 @@ public string[] RequiredExtensions { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -1873,7 +1830,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -1887,7 +1844,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -1901,7 +1858,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -1915,7 +1872,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -1929,7 +1886,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -1943,7 +1900,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -1957,7 +1914,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -1971,7 +1928,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -1985,7 +1942,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/certAuthBackendRole.go.md b/docs/certAuthBackendRole.go.md index 88e2cb26..f902551c 100644 --- a/docs/certAuthBackendRole.go.md +++ b/docs/certAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/certauthbackendrole" certauthbackendrole.NewCertAuthBackendRole(scope Construct, id *string, config CertAuthBackendRoleConfig) CertAuthBackendRole ``` @@ -78,7 +78,6 @@ Must be unique amongst siblings in the same scope | ResetAllowedEmailSans | *No description.* | | ResetAllowedNames | *No description.* | | ResetAllowedOrganizationalUnits | *No description.* | -| ResetAllowedOrganizationUnits | *No description.* | | ResetAllowedUriSans | *No description.* | | ResetBackend | *No description.* | | ResetDisplayName | *No description.* | @@ -420,12 +419,6 @@ func ResetAllowedNames() func ResetAllowedOrganizationalUnits() ``` -##### `ResetAllowedOrganizationUnits` - -```go -func ResetAllowedOrganizationUnits() -``` - ##### `ResetAllowedUriSans` ```go @@ -560,7 +553,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/certauthbackendrole" certauthbackendrole.CertAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -592,7 +585,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/certauthbackendrole" certauthbackendrole.CertAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -606,7 +599,7 @@ certauthbackendrole.CertAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/certauthbackendrole" certauthbackendrole.CertAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -620,7 +613,7 @@ certauthbackendrole.CertAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/certauthbackendrole" certauthbackendrole.CertAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -649,7 +642,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -684,7 +677,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | AllowedEmailSansInput | *[]*string | *No description.* | | AllowedNamesInput | *[]*string | *No description.* | | AllowedOrganizationalUnitsInput | *[]*string | *No description.* | -| AllowedOrganizationUnitsInput | *[]*string | *No description.* | | AllowedUriSansInput | *[]*string | *No description.* | | BackendInput | *string | *No description.* | | CertificateInput | *string | *No description.* | @@ -712,7 +704,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | AllowedEmailSans | *[]*string | *No description.* | | AllowedNames | *[]*string | *No description.* | | AllowedOrganizationalUnits | *[]*string | *No description.* | -| AllowedOrganizationUnits | *[]*string | *No description.* | | AllowedUriSans | *[]*string | *No description.* | | Backend | *string | *No description.* | | Certificate | *string | *No description.* | @@ -930,16 +921,6 @@ func AllowedOrganizationalUnitsInput() *[]*string --- -##### `AllowedOrganizationUnitsInput`Optional - -```go -func AllowedOrganizationUnitsInput() *[]*string -``` - -- *Type:* *[]*string - ---- - ##### `AllowedUriSansInput`Optional ```go @@ -1210,16 +1191,6 @@ func AllowedOrganizationalUnits() *[]*string --- -##### `AllowedOrganizationUnits`Required - -```go -func AllowedOrganizationUnits() *[]*string -``` - -- *Type:* *[]*string - ---- - ##### `AllowedUriSans`Required ```go @@ -1465,7 +1436,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/certauthbackendrole" &certauthbackendrole.CertAuthBackendRoleConfig { Connection: interface{}, @@ -1482,7 +1453,6 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" AllowedEmailSans: *[]*string, AllowedNames: *[]*string, AllowedOrganizationalUnits: *[]*string, - AllowedOrganizationUnits: *[]*string, AllowedUriSans: *[]*string, Backend: *string, DisplayName: *string, @@ -1517,25 +1487,24 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/certauthbackendrole" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Certificate | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| Name | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| AllowedCommonNames | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| AllowedDnsSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| AllowedEmailSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| AllowedNames | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| AllowedOrganizationalUnits | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| AllowedOrganizationUnits | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. | -| AllowedUriSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| DisplayName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| Certificate | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| Name | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| AllowedCommonNames | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| AllowedDnsSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| AllowedEmailSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| AllowedNames | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| AllowedOrganizationalUnits | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| AllowedUriSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| DisplayName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | OcspCaCertificates | *string | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | OcspEnabled | interface{} | If enabled, validate certificates' revocation status using OCSP. | | OcspFailOpen | interface{} | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | OcspQueryAllServers | interface{} | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | OcspServersOverride | *[]*string | A comma-separated list of OCSP server addresses. | -| RequiredExtensions | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| RequiredExtensions | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | | TokenMaxTtl | *f64 | The maximum lifetime of the generated token. | @@ -1626,7 +1595,7 @@ Certificate *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -1638,7 +1607,7 @@ Name *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -1650,7 +1619,7 @@ AllowedCommonNames *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -1662,7 +1631,7 @@ AllowedDnsSans *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -1674,7 +1643,7 @@ AllowedEmailSans *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -1686,7 +1655,7 @@ AllowedNames *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -1698,19 +1667,7 @@ AllowedOrganizationalUnits *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. - ---- - -##### `AllowedOrganizationUnits`Optional - -```go -AllowedOrganizationUnits *[]*string -``` - -- *Type:* *[]*string - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -1722,7 +1679,7 @@ AllowedUriSans *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -1734,7 +1691,7 @@ Backend *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -1746,7 +1703,7 @@ DisplayName *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -1758,7 +1715,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1775,7 +1732,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -1789,7 +1746,7 @@ OcspCaCertificates *string Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -1803,7 +1760,7 @@ OcspEnabled interface{} If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -1817,7 +1774,7 @@ OcspFailOpen interface{} If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -1831,7 +1788,7 @@ OcspQueryAllServers interface{} If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -1847,7 +1804,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -1859,7 +1816,7 @@ RequiredExtensions *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -1873,7 +1830,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -1887,7 +1844,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -1901,7 +1858,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -1915,7 +1872,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -1929,7 +1886,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -1943,7 +1900,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -1957,7 +1914,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -1971,7 +1928,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -1985,7 +1942,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/certAuthBackendRole.java.md b/docs/certAuthBackendRole.java.md index 4749bc66..74e83ef9 100644 --- a/docs/certAuthBackendRole.java.md +++ b/docs/certAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers @@ -30,7 +30,6 @@ CertAuthBackendRole.Builder.create(Construct scope, java.lang.String id) // .allowedEmailSans(java.util.List) // .allowedNames(java.util.List) // .allowedOrganizationalUnits(java.util.List) -// .allowedOrganizationUnits(java.util.List) // .allowedUriSans(java.util.List) // .backend(java.lang.String) // .displayName(java.lang.String) @@ -69,25 +68,24 @@ CertAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowedCommonNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowedDnsSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowedEmailSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowedNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowedOrganizationalUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowedOrganizationUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. | -| allowedUriSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| displayName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowedCommonNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowedDnsSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowedEmailSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowedNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowedOrganizationalUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowedUriSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| displayName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspCaCertificates | java.lang.String | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocspEnabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, validate certificates' revocation status using OCSP. | | ocspFailOpen | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocspQueryAllServers | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocspServersOverride | java.util.List | A comma-separated list of OCSP server addresses. | -| requiredExtensions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| requiredExtensions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | java.lang.Number | The maximum lifetime of the generated token. | @@ -164,7 +162,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -172,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -180,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -188,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -196,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -204,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -212,15 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. - ---- - -##### `allowedOrganizationUnits`Optional - -- *Type:* java.util.List - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -228,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -236,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -244,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -252,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -265,7 +255,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -275,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -285,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -295,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -305,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -317,7 +307,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -325,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -335,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -345,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -355,7 +345,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -365,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -375,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -385,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -395,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -405,7 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -415,7 +405,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- @@ -451,7 +441,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetAllowedEmailSans | *No description.* | | resetAllowedNames | *No description.* | | resetAllowedOrganizationalUnits | *No description.* | -| resetAllowedOrganizationUnits | *No description.* | | resetAllowedUriSans | *No description.* | | resetBackend | *No description.* | | resetDisplayName | *No description.* | @@ -795,12 +784,6 @@ public void resetAllowedNames() public void resetAllowedOrganizationalUnits() ``` -##### `resetAllowedOrganizationUnits` - -```java -public void resetAllowedOrganizationUnits() -``` - ##### `resetAllowedUriSans` ```java @@ -1024,7 +1007,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1059,7 +1042,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowedEmailSansInput | java.util.List | *No description.* | | allowedNamesInput | java.util.List | *No description.* | | allowedOrganizationalUnitsInput | java.util.List | *No description.* | -| allowedOrganizationUnitsInput | java.util.List | *No description.* | | allowedUriSansInput | java.util.List | *No description.* | | backendInput | java.lang.String | *No description.* | | certificateInput | java.lang.String | *No description.* | @@ -1087,7 +1069,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowedEmailSans | java.util.List | *No description.* | | allowedNames | java.util.List | *No description.* | | allowedOrganizationalUnits | java.util.List | *No description.* | -| allowedOrganizationUnits | java.util.List | *No description.* | | allowedUriSans | java.util.List | *No description.* | | backend | java.lang.String | *No description.* | | certificate | java.lang.String | *No description.* | @@ -1305,16 +1286,6 @@ public java.util.List getAllowedOrganizationalUnitsInput(); --- -##### `allowedOrganizationUnitsInput`Optional - -```java -public java.util.List getAllowedOrganizationUnitsInput(); -``` - -- *Type:* java.util.List - ---- - ##### `allowedUriSansInput`Optional ```java @@ -1585,16 +1556,6 @@ public java.util.List getAllowedOrganizationalUnits(); --- -##### `allowedOrganizationUnits`Required - -```java -public java.util.List getAllowedOrganizationUnits(); -``` - -- *Type:* java.util.List - ---- - ##### `allowedUriSans`Required ```java @@ -1861,7 +1822,6 @@ CertAuthBackendRoleConfig.builder() // .allowedEmailSans(java.util.List) // .allowedNames(java.util.List) // .allowedOrganizationalUnits(java.util.List) -// .allowedOrganizationUnits(java.util.List) // .allowedUriSans(java.util.List) // .backend(java.lang.String) // .displayName(java.lang.String) @@ -1900,25 +1860,24 @@ CertAuthBackendRoleConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowedCommonNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowedDnsSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowedEmailSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowedNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowedOrganizationalUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowedOrganizationUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. | -| allowedUriSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| displayName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowedCommonNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowedDnsSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowedEmailSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowedNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowedOrganizationalUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowedUriSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| displayName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspCaCertificates | java.lang.String | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocspEnabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, validate certificates' revocation status using OCSP. | | ocspFailOpen | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocspQueryAllServers | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocspServersOverride | java.util.List | A comma-separated list of OCSP server addresses. | -| requiredExtensions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| requiredExtensions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | java.lang.Number | The maximum lifetime of the generated token. | @@ -2009,7 +1968,7 @@ public java.lang.String getCertificate(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -2021,7 +1980,7 @@ public java.lang.String getName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -2033,7 +1992,7 @@ public java.util.List getAllowedCommonNames(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -2045,7 +2004,7 @@ public java.util.List getAllowedDnsSans(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -2057,7 +2016,7 @@ public java.util.List getAllowedEmailSans(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -2069,7 +2028,7 @@ public java.util.List getAllowedNames(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -2081,19 +2040,7 @@ public java.util.List getAllowedOrganizationalUnits(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. - ---- - -##### `allowedOrganizationUnits`Optional - -```java -public java.util.List getAllowedOrganizationUnits(); -``` - -- *Type:* java.util.List - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -2105,7 +2052,7 @@ public java.util.List getAllowedUriSans(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -2117,7 +2064,7 @@ public java.lang.String getBackend(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -2129,7 +2076,7 @@ public java.lang.String getDisplayName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -2141,7 +2088,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2158,7 +2105,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -2172,7 +2119,7 @@ public java.lang.String getOcspCaCertificates(); Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -2186,7 +2133,7 @@ public java.lang.Object getOcspEnabled(); If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -2200,7 +2147,7 @@ public java.lang.Object getOcspFailOpen(); If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -2214,7 +2161,7 @@ public java.lang.Object getOcspQueryAllServers(); If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -2230,7 +2177,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -2242,7 +2189,7 @@ public java.util.List getRequiredExtensions(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -2256,7 +2203,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -2270,7 +2217,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -2284,7 +2231,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -2298,7 +2245,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -2312,7 +2259,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -2326,7 +2273,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -2340,7 +2287,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -2354,7 +2301,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -2368,7 +2315,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/certAuthBackendRole.python.md b/docs/certAuthBackendRole.python.md index afc4a875..59bde808 100644 --- a/docs/certAuthBackendRole.python.md +++ b/docs/certAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers @@ -28,7 +28,6 @@ certAuthBackendRole.CertAuthBackendRole( allowed_email_sans: typing.List[str] = None, allowed_names: typing.List[str] = None, allowed_organizational_units: typing.List[str] = None, - allowed_organization_units: typing.List[str] = None, allowed_uri_sans: typing.List[str] = None, backend: str = None, display_name: str = None, @@ -63,25 +62,24 @@ certAuthBackendRole.CertAuthBackendRole( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowed_common_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowed_dns_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowed_email_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowed_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowed_organizational_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowed_organization_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. | -| allowed_uri_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| display_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowed_common_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowed_dns_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowed_email_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowed_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowed_organizational_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowed_uri_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| display_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ocsp_ca_certificates | str | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocsp_enabled | typing.Union[bool, cdktf.IResolvable] | If enabled, validate certificates' revocation status using OCSP. | | ocsp_fail_open | typing.Union[bool, cdktf.IResolvable] | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocsp_query_all_servers | typing.Union[bool, cdktf.IResolvable] | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocsp_servers_override | typing.List[str] | A comma-separated list of OCSP server addresses. | -| required_extensions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| required_extensions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | | token_max_ttl | typing.Union[int, float] | The maximum lifetime of the generated token. | @@ -158,7 +156,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -166,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -174,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -182,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -190,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -198,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -206,15 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. - ---- - -##### `allowed_organization_units`Optional - -- *Type:* typing.List[str] - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -222,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -230,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -238,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -246,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -259,7 +249,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -269,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -279,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -289,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -299,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -311,7 +301,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -319,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -329,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -339,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -349,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -359,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -369,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -379,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -389,7 +379,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -399,7 +389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -409,7 +399,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- @@ -445,7 +435,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_allowed_email_sans | *No description.* | | reset_allowed_names | *No description.* | | reset_allowed_organizational_units | *No description.* | -| reset_allowed_organization_units | *No description.* | | reset_allowed_uri_sans | *No description.* | | reset_backend | *No description.* | | reset_display_name | *No description.* | @@ -824,12 +813,6 @@ def reset_allowed_names() -> None def reset_allowed_organizational_units() -> None ``` -##### `reset_allowed_organization_units` - -```python -def reset_allowed_organization_units() -> None -``` - ##### `reset_allowed_uri_sans` ```python @@ -1064,7 +1047,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1099,7 +1082,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowed_email_sans_input | typing.List[str] | *No description.* | | allowed_names_input | typing.List[str] | *No description.* | | allowed_organizational_units_input | typing.List[str] | *No description.* | -| allowed_organization_units_input | typing.List[str] | *No description.* | | allowed_uri_sans_input | typing.List[str] | *No description.* | | backend_input | str | *No description.* | | certificate_input | str | *No description.* | @@ -1127,7 +1109,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowed_email_sans | typing.List[str] | *No description.* | | allowed_names | typing.List[str] | *No description.* | | allowed_organizational_units | typing.List[str] | *No description.* | -| allowed_organization_units | typing.List[str] | *No description.* | | allowed_uri_sans | typing.List[str] | *No description.* | | backend | str | *No description.* | | certificate | str | *No description.* | @@ -1345,16 +1326,6 @@ allowed_organizational_units_input: typing.List[str] --- -##### `allowed_organization_units_input`Optional - -```python -allowed_organization_units_input: typing.List[str] -``` - -- *Type:* typing.List[str] - ---- - ##### `allowed_uri_sans_input`Optional ```python @@ -1625,16 +1596,6 @@ allowed_organizational_units: typing.List[str] --- -##### `allowed_organization_units`Required - -```python -allowed_organization_units: typing.List[str] -``` - -- *Type:* typing.List[str] - ---- - ##### `allowed_uri_sans`Required ```python @@ -1897,7 +1858,6 @@ certAuthBackendRole.CertAuthBackendRoleConfig( allowed_email_sans: typing.List[str] = None, allowed_names: typing.List[str] = None, allowed_organizational_units: typing.List[str] = None, - allowed_organization_units: typing.List[str] = None, allowed_uri_sans: typing.List[str] = None, backend: str = None, display_name: str = None, @@ -1932,25 +1892,24 @@ certAuthBackendRole.CertAuthBackendRoleConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowed_common_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowed_dns_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowed_email_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowed_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowed_organizational_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowed_organization_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. | -| allowed_uri_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| display_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowed_common_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowed_dns_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowed_email_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowed_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowed_organizational_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowed_uri_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| display_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ocsp_ca_certificates | str | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocsp_enabled | typing.Union[bool, cdktf.IResolvable] | If enabled, validate certificates' revocation status using OCSP. | | ocsp_fail_open | typing.Union[bool, cdktf.IResolvable] | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocsp_query_all_servers | typing.Union[bool, cdktf.IResolvable] | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocsp_servers_override | typing.List[str] | A comma-separated list of OCSP server addresses. | -| required_extensions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| required_extensions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | | token_max_ttl | typing.Union[int, float] | The maximum lifetime of the generated token. | @@ -2041,7 +2000,7 @@ certificate: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -2053,7 +2012,7 @@ name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -2065,7 +2024,7 @@ allowed_common_names: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -2077,7 +2036,7 @@ allowed_dns_sans: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -2089,7 +2048,7 @@ allowed_email_sans: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -2101,7 +2060,7 @@ allowed_names: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -2113,19 +2072,7 @@ allowed_organizational_units: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. - ---- - -##### `allowed_organization_units`Optional - -```python -allowed_organization_units: typing.List[str] -``` - -- *Type:* typing.List[str] - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -2137,7 +2084,7 @@ allowed_uri_sans: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -2149,7 +2096,7 @@ backend: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -2161,7 +2108,7 @@ display_name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -2173,7 +2120,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2190,7 +2137,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -2204,7 +2151,7 @@ ocsp_ca_certificates: str Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -2218,7 +2165,7 @@ ocsp_enabled: typing.Union[bool, IResolvable] If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -2232,7 +2179,7 @@ ocsp_fail_open: typing.Union[bool, IResolvable] If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -2246,7 +2193,7 @@ ocsp_query_all_servers: typing.Union[bool, IResolvable] If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -2262,7 +2209,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -2274,7 +2221,7 @@ required_extensions: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -2288,7 +2235,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -2302,7 +2249,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -2316,7 +2263,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -2330,7 +2277,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -2344,7 +2291,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -2358,7 +2305,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -2372,7 +2319,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -2386,7 +2333,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -2400,7 +2347,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/certAuthBackendRole.typescript.md b/docs/certAuthBackendRole.typescript.md index c7f0198a..f018b1d6 100644 --- a/docs/certAuthBackendRole.typescript.md +++ b/docs/certAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers @@ -78,7 +78,6 @@ Must be unique amongst siblings in the same scope | resetAllowedEmailSans | *No description.* | | resetAllowedNames | *No description.* | | resetAllowedOrganizationalUnits | *No description.* | -| resetAllowedOrganizationUnits | *No description.* | | resetAllowedUriSans | *No description.* | | resetBackend | *No description.* | | resetDisplayName | *No description.* | @@ -420,12 +419,6 @@ public resetAllowedNames(): void public resetAllowedOrganizationalUnits(): void ``` -##### `resetAllowedOrganizationUnits` - -```typescript -public resetAllowedOrganizationUnits(): void -``` - ##### `resetAllowedUriSans` ```typescript @@ -649,7 +642,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -684,7 +677,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowedEmailSansInput | string[] | *No description.* | | allowedNamesInput | string[] | *No description.* | | allowedOrganizationalUnitsInput | string[] | *No description.* | -| allowedOrganizationUnitsInput | string[] | *No description.* | | allowedUriSansInput | string[] | *No description.* | | backendInput | string | *No description.* | | certificateInput | string | *No description.* | @@ -712,7 +704,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowedEmailSans | string[] | *No description.* | | allowedNames | string[] | *No description.* | | allowedOrganizationalUnits | string[] | *No description.* | -| allowedOrganizationUnits | string[] | *No description.* | | allowedUriSans | string[] | *No description.* | | backend | string | *No description.* | | certificate | string | *No description.* | @@ -930,16 +921,6 @@ public readonly allowedOrganizationalUnitsInput: string[]; --- -##### `allowedOrganizationUnitsInput`Optional - -```typescript -public readonly allowedOrganizationUnitsInput: string[]; -``` - -- *Type:* string[] - ---- - ##### `allowedUriSansInput`Optional ```typescript @@ -1210,16 +1191,6 @@ public readonly allowedOrganizationalUnits: string[]; --- -##### `allowedOrganizationUnits`Required - -```typescript -public readonly allowedOrganizationUnits: string[]; -``` - -- *Type:* string[] - ---- - ##### `allowedUriSans`Required ```typescript @@ -1481,25 +1452,24 @@ const certAuthBackendRoleConfig: certAuthBackendRole.CertAuthBackendRoleConfig = | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowedCommonNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowedDnsSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowedEmailSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowedNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowedOrganizationalUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowedOrganizationUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. | -| allowedUriSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| displayName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowedCommonNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowedDnsSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowedEmailSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowedNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowedOrganizationalUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowedUriSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| displayName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | ocspCaCertificates | string | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocspEnabled | boolean \| cdktf.IResolvable | If enabled, validate certificates' revocation status using OCSP. | | ocspFailOpen | boolean \| cdktf.IResolvable | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocspQueryAllServers | boolean \| cdktf.IResolvable | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocspServersOverride | string[] | A comma-separated list of OCSP server addresses. | -| requiredExtensions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| requiredExtensions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | number | The maximum lifetime of the generated token. | @@ -1590,7 +1560,7 @@ public readonly certificate: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -1602,7 +1572,7 @@ public readonly name: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -1614,7 +1584,7 @@ public readonly allowedCommonNames: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -1626,7 +1596,7 @@ public readonly allowedDnsSans: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -1638,7 +1608,7 @@ public readonly allowedEmailSans: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -1650,7 +1620,7 @@ public readonly allowedNames: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -1662,19 +1632,7 @@ public readonly allowedOrganizationalUnits: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. - ---- - -##### `allowedOrganizationUnits`Optional - -```typescript -public readonly allowedOrganizationUnits: string[]; -``` - -- *Type:* string[] - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -1686,7 +1644,7 @@ public readonly allowedUriSans: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -1698,7 +1656,7 @@ public readonly backend: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -1710,7 +1668,7 @@ public readonly displayName: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -1722,7 +1680,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1739,7 +1697,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -1753,7 +1711,7 @@ public readonly ocspCaCertificates: string; Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -1767,7 +1725,7 @@ public readonly ocspEnabled: boolean | IResolvable; If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -1781,7 +1739,7 @@ public readonly ocspFailOpen: boolean | IResolvable; If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -1795,7 +1753,7 @@ public readonly ocspQueryAllServers: boolean | IResolvable; If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -1811,7 +1769,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -1823,7 +1781,7 @@ public readonly requiredExtensions: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -1837,7 +1795,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -1851,7 +1809,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -1865,7 +1823,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -1879,7 +1837,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -1893,7 +1851,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -1907,7 +1865,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -1921,7 +1879,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -1935,7 +1893,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -1949,7 +1907,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/consulSecretBackend.csharp.md b/docs/consulSecretBackend.csharp.md index 51ea80cc..697678ba 100644 --- a/docs/consulSecretBackend.csharp.md +++ b/docs/consulSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1142,7 +1142,7 @@ new ConsulSecretBackendConfig { | DefaultLeaseTtlSeconds | double | Default lease duration for secrets in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | Local | object | Specifies if the secret backend is local only. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for secrets in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1232,7 +1232,7 @@ public string Address { get; set; } Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1248,7 +1248,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1262,7 +1262,7 @@ public string CaCert { get; set; } CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1276,7 +1276,7 @@ public string ClientCert { get; set; } Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1290,7 +1290,7 @@ public string ClientKey { get; set; } Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1304,7 +1304,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1318,7 +1318,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1332,7 +1332,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1344,7 +1344,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1361,7 +1361,7 @@ public object Local { get; set; } Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1375,7 +1375,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1389,7 +1389,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1403,7 +1403,7 @@ public string Path { get; set; } Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1417,7 +1417,7 @@ public string Scheme { get; set; } Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1431,7 +1431,7 @@ public string Token { get; set; } Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackend.go.md b/docs/consulSecretBackend.go.md index 316eda14..cd72ab99 100644 --- a/docs/consulSecretBackend.go.md +++ b/docs/consulSecretBackend.go.md @@ -4,12 +4,12 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackend" consulsecretbackend.NewConsulSecretBackend(scope Construct, id *string, config ConsulSecretBackendConfig) ConsulSecretBackend ``` @@ -476,7 +476,7 @@ func ResetToken() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackend" consulsecretbackend.ConsulSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -508,7 +508,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackend" consulsecretbackend.ConsulSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -522,7 +522,7 @@ consulsecretbackend.ConsulSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackend" consulsecretbackend.ConsulSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -536,7 +536,7 @@ consulsecretbackend.ConsulSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackend" consulsecretbackend.ConsulSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -565,7 +565,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1095,7 +1095,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackend" &consulsecretbackend.ConsulSecretBackendConfig { Connection: interface{}, @@ -1142,7 +1142,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackend" | DefaultLeaseTtlSeconds | *f64 | Default lease duration for secrets in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | Local | interface{} | Specifies if the secret backend is local only. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for secrets in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1232,7 +1232,7 @@ Address *string Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1248,7 +1248,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1262,7 +1262,7 @@ CaCert *string CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1276,7 +1276,7 @@ ClientCert *string Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1290,7 +1290,7 @@ ClientKey *string Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1304,7 +1304,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1318,7 +1318,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1332,7 +1332,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1344,7 +1344,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1361,7 +1361,7 @@ Local interface{} Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1375,7 +1375,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1389,7 +1389,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1403,7 +1403,7 @@ Path *string Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1417,7 +1417,7 @@ Scheme *string Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1431,7 +1431,7 @@ Token *string Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackend.java.md b/docs/consulSecretBackend.java.md index 909eadcf..4f7bf752 100644 --- a/docs/consulSecretBackend.java.md +++ b/docs/consulSecretBackend.java.md @@ -4,7 +4,7 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers @@ -63,7 +63,7 @@ ConsulSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the secret backend is local only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -139,7 +139,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -151,7 +151,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -232,7 +232,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- @@ -807,7 +807,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1391,7 +1391,7 @@ ConsulSecretBackendConfig.builder() | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the secret backend is local only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1481,7 +1481,7 @@ public java.lang.String getAddress(); Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1497,7 +1497,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1511,7 +1511,7 @@ public java.lang.String getCaCert(); CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1525,7 +1525,7 @@ public java.lang.String getClientCert(); Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1539,7 +1539,7 @@ public java.lang.String getClientKey(); Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1553,7 +1553,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1567,7 +1567,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1581,7 +1581,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1593,7 +1593,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1610,7 +1610,7 @@ public java.lang.Object getLocal(); Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1624,7 +1624,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1638,7 +1638,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1652,7 +1652,7 @@ public java.lang.String getPath(); Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1666,7 +1666,7 @@ public java.lang.String getScheme(); Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1680,7 +1680,7 @@ public java.lang.String getToken(); Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackend.python.md b/docs/consulSecretBackend.python.md index c19ac853..4874a46f 100644 --- a/docs/consulSecretBackend.python.md +++ b/docs/consulSecretBackend.python.md @@ -4,7 +4,7 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers @@ -58,7 +58,7 @@ consulSecretBackend.ConsulSecretBackend( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the secret backend is local only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -146,7 +146,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -227,7 +227,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- @@ -848,7 +848,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1425,7 +1425,7 @@ consulSecretBackend.ConsulSecretBackendConfig( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the secret backend is local only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1515,7 +1515,7 @@ address: str Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1531,7 +1531,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1545,7 +1545,7 @@ ca_cert: str CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1559,7 +1559,7 @@ client_cert: str Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1573,7 +1573,7 @@ client_key: str Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1587,7 +1587,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1601,7 +1601,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1615,7 +1615,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1627,7 +1627,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1644,7 +1644,7 @@ local: typing.Union[bool, IResolvable] Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1658,7 +1658,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1672,7 +1672,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1686,7 +1686,7 @@ path: str Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1700,7 +1700,7 @@ scheme: str Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1714,7 +1714,7 @@ token: str Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackend.typescript.md b/docs/consulSecretBackend.typescript.md index 50b72353..11c112d1 100644 --- a/docs/consulSecretBackend.typescript.md +++ b/docs/consulSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1119,7 +1119,7 @@ const consulSecretBackendConfig: consulSecretBackend.ConsulSecretBackendConfig = | defaultLeaseTtlSeconds | number | Default lease duration for secrets in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | boolean \| cdktf.IResolvable | Specifies if the secret backend is local only. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for secrets in seconds. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1209,7 +1209,7 @@ public readonly address: string; Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1225,7 +1225,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1239,7 +1239,7 @@ public readonly caCert: string; CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1253,7 +1253,7 @@ public readonly clientCert: string; Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1267,7 +1267,7 @@ public readonly clientKey: string; Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1281,7 +1281,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1295,7 +1295,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1309,7 +1309,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1321,7 +1321,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1338,7 +1338,7 @@ public readonly local: boolean | IResolvable; Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1352,7 +1352,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1366,7 +1366,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1380,7 +1380,7 @@ public readonly path: string; Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1394,7 +1394,7 @@ public readonly scheme: string; Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1408,7 +1408,7 @@ public readonly token: string; Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackendRole.csharp.md b/docs/consulSecretBackendRole.csharp.md index a2df1f67..be52dbe3 100644 --- a/docs/consulSecretBackendRole.csharp.md +++ b/docs/consulSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers @@ -85,7 +85,6 @@ Must be unique amongst siblings in the same scope | ResetPartition | *No description.* | | ResetPolicies | *No description.* | | ResetServiceIdentities | *No description.* | -| ResetTokenType | *No description.* | | ResetTtl | *No description.* | --- @@ -450,12 +449,6 @@ private void ResetPolicies() private void ResetServiceIdentities() ``` -##### `ResetTokenType` - -```csharp -private void ResetTokenType() -``` - ##### `ResetTtl` ```csharp @@ -565,7 +558,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -608,7 +601,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | PartitionInput | string | *No description.* | | PoliciesInput | string[] | *No description.* | | ServiceIdentitiesInput | string[] | *No description.* | -| TokenTypeInput | string | *No description.* | | TtlInput | double | *No description.* | | Backend | string | *No description.* | | ConsulNamespace | string | *No description.* | @@ -623,7 +615,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Partition | string | *No description.* | | Policies | string[] | *No description.* | | ServiceIdentities | string[] | *No description.* | -| TokenType | string | *No description.* | | Ttl | double | *No description.* | --- @@ -900,16 +891,6 @@ public string[] ServiceIdentitiesInput { get; } --- -##### `TokenTypeInput`Optional - -```csharp -public string TokenTypeInput { get; } -``` - -- *Type:* string - ---- - ##### `TtlInput`Optional ```csharp @@ -1050,16 +1031,6 @@ public string[] ServiceIdentities { get; } --- -##### `TokenType`Required - -```csharp -public string TokenType { get; } -``` - -- *Type:* string - ---- - ##### `Ttl`Required ```csharp @@ -1118,7 +1089,6 @@ new ConsulSecretBackendRoleConfig { string Partition = null, string[] Policies = null, string[] ServiceIdentities = null, - string TokenType = null, double Ttl = null }; ``` @@ -1139,7 +1109,7 @@ new ConsulSecretBackendRoleConfig { | ConsulNamespace | string | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | ConsulPolicies | string[] | List of Consul policies to associate with this role. | | ConsulRoles | string[] | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | Local | object | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | MaxTtl | double | Maximum TTL for leases associated with this role, in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1147,7 +1117,6 @@ new ConsulSecretBackendRoleConfig { | Partition | string | The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. | | Policies | string[] | List of Consul policies to associate with this role. | | ServiceIdentities | string[] | Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. | -| TokenType | string | Specifies the type of token to create when using this role. Valid values are "client" or "management". | | Ttl | double | Specifies the TTL for this role. | --- @@ -1232,7 +1201,7 @@ public string Name { get; set; } The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1246,7 +1215,7 @@ public string Backend { get; set; } The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1260,7 +1229,7 @@ public string ConsulNamespace { get; set; } The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1274,7 +1243,7 @@ public string[] ConsulPolicies { get; set; } List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1288,7 +1257,7 @@ public string[] ConsulRoles { get; set; } Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1300,7 +1269,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1317,7 +1286,7 @@ public object Local { get; set; } Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1331,7 +1300,7 @@ public double MaxTtl { get; set; } Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1345,7 +1314,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1359,7 +1328,7 @@ public string[] NodeIdentities { get; set; } Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1373,7 +1342,7 @@ public string Partition { get; set; } The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1387,7 +1356,7 @@ public string[] Policies { get; set; } List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1401,21 +1370,7 @@ public string[] ServiceIdentities { get; set; } Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} - ---- - -##### `TokenType`Optional - -```csharp -public string TokenType { get; set; } -``` - -- *Type:* string - -Specifies the type of token to create when using this role. Valid values are "client" or "management". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1429,7 +1384,7 @@ public double Ttl { get; set; } Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/consulSecretBackendRole.go.md b/docs/consulSecretBackendRole.go.md index 2c8ea5b7..f2ed8f8b 100644 --- a/docs/consulSecretBackendRole.go.md +++ b/docs/consulSecretBackendRole.go.md @@ -4,12 +4,12 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackendrole" consulsecretbackendrole.NewConsulSecretBackendRole(scope Construct, id *string, config ConsulSecretBackendRoleConfig) ConsulSecretBackendRole ``` @@ -85,7 +85,6 @@ Must be unique amongst siblings in the same scope | ResetPartition | *No description.* | | ResetPolicies | *No description.* | | ResetServiceIdentities | *No description.* | -| ResetTokenType | *No description.* | | ResetTtl | *No description.* | --- @@ -450,12 +449,6 @@ func ResetPolicies() func ResetServiceIdentities() ``` -##### `ResetTokenType` - -```go -func ResetTokenType() -``` - ##### `ResetTtl` ```go @@ -476,7 +469,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackendrole" consulsecretbackendrole.ConsulSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -508,7 +501,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackendrole" consulsecretbackendrole.ConsulSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -522,7 +515,7 @@ consulsecretbackendrole.ConsulSecretBackendRole_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackendrole" consulsecretbackendrole.ConsulSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -536,7 +529,7 @@ consulsecretbackendrole.ConsulSecretBackendRole_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackendrole" consulsecretbackendrole.ConsulSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -565,7 +558,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -608,7 +601,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | PartitionInput | *string | *No description.* | | PoliciesInput | *[]*string | *No description.* | | ServiceIdentitiesInput | *[]*string | *No description.* | -| TokenTypeInput | *string | *No description.* | | TtlInput | *f64 | *No description.* | | Backend | *string | *No description.* | | ConsulNamespace | *string | *No description.* | @@ -623,7 +615,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Partition | *string | *No description.* | | Policies | *[]*string | *No description.* | | ServiceIdentities | *[]*string | *No description.* | -| TokenType | *string | *No description.* | | Ttl | *f64 | *No description.* | --- @@ -900,16 +891,6 @@ func ServiceIdentitiesInput() *[]*string --- -##### `TokenTypeInput`Optional - -```go -func TokenTypeInput() *string -``` - -- *Type:* *string - ---- - ##### `TtlInput`Optional ```go @@ -1050,16 +1031,6 @@ func ServiceIdentities() *[]*string --- -##### `TokenType`Required - -```go -func TokenType() *string -``` - -- *Type:* *string - ---- - ##### `Ttl`Required ```go @@ -1095,7 +1066,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackendrole" &consulsecretbackendrole.ConsulSecretBackendRoleConfig { Connection: interface{}, @@ -1118,7 +1089,6 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendro Partition: *string, Policies: *[]*string, ServiceIdentities: *[]*string, - TokenType: *string, Ttl: *f64, } ``` @@ -1139,7 +1109,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendro | ConsulNamespace | *string | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | ConsulPolicies | *[]*string | List of Consul policies to associate with this role. | | ConsulRoles | *[]*string | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | Local | interface{} | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | MaxTtl | *f64 | Maximum TTL for leases associated with this role, in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1147,7 +1117,6 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/consulsecretbackendro | Partition | *string | The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. | | Policies | *[]*string | List of Consul policies to associate with this role. | | ServiceIdentities | *[]*string | Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. | -| TokenType | *string | Specifies the type of token to create when using this role. Valid values are "client" or "management". | | Ttl | *f64 | Specifies the TTL for this role. | --- @@ -1232,7 +1201,7 @@ Name *string The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1246,7 +1215,7 @@ Backend *string The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1260,7 +1229,7 @@ ConsulNamespace *string The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1274,7 +1243,7 @@ ConsulPolicies *[]*string List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1288,7 +1257,7 @@ ConsulRoles *[]*string Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1300,7 +1269,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1317,7 +1286,7 @@ Local interface{} Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1331,7 +1300,7 @@ MaxTtl *f64 Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1345,7 +1314,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1359,7 +1328,7 @@ NodeIdentities *[]*string Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1373,7 +1342,7 @@ Partition *string The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1387,7 +1356,7 @@ Policies *[]*string List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1401,21 +1370,7 @@ ServiceIdentities *[]*string Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} - ---- - -##### `TokenType`Optional - -```go -TokenType *string -``` - -- *Type:* *string - -Specifies the type of token to create when using this role. Valid values are "client" or "management". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1429,7 +1384,7 @@ Ttl *f64 Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/consulSecretBackendRole.java.md b/docs/consulSecretBackendRole.java.md index d59747bf..c2579940 100644 --- a/docs/consulSecretBackendRole.java.md +++ b/docs/consulSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers @@ -37,7 +37,6 @@ ConsulSecretBackendRole.Builder.create(Construct scope, java.lang.String id) // .partition(java.lang.String) // .policies(java.util.List) // .serviceIdentities(java.util.List) -// .tokenType(java.lang.String) // .ttl(java.lang.Number) .build(); ``` @@ -58,7 +57,7 @@ ConsulSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | consulNamespace | java.lang.String | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consulPolicies | java.util.List | List of Consul policies to associate with this role. | | consulRoles | java.util.List | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | maxTtl | java.lang.Number | Maximum TTL for leases associated with this role, in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -66,7 +65,6 @@ ConsulSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | partition | java.lang.String | The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. | | policies | java.util.List | List of Consul policies to associate with this role. | | serviceIdentities | java.util.List | Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. | -| tokenType | java.lang.String | Specifies the type of token to create when using this role. Valid values are "client" or "management". | | ttl | java.lang.Number | Specifies the TTL for this role. | --- @@ -137,7 +135,7 @@ Must be unique amongst siblings in the same scope The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -147,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -157,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -167,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -177,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -185,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -198,7 +196,7 @@ If you experience problems setting this value it might not be settable. Please t Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -208,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -218,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -228,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -238,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -248,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -258,17 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} - ---- - -##### `tokenType`Optional - -- *Type:* java.lang.String - -Specifies the type of token to create when using this role. Valid values are "client" or "management". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -278,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- @@ -321,7 +309,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetPartition | *No description.* | | resetPolicies | *No description.* | | resetServiceIdentities | *No description.* | -| resetTokenType | *No description.* | | resetTtl | *No description.* | --- @@ -688,12 +675,6 @@ public void resetPolicies() public void resetServiceIdentities() ``` -##### `resetTokenType` - -```java -public void resetTokenType() -``` - ##### `resetTtl` ```java @@ -803,7 +784,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -846,7 +827,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | partitionInput | java.lang.String | *No description.* | | policiesInput | java.util.List | *No description.* | | serviceIdentitiesInput | java.util.List | *No description.* | -| tokenTypeInput | java.lang.String | *No description.* | | ttlInput | java.lang.Number | *No description.* | | backend | java.lang.String | *No description.* | | consulNamespace | java.lang.String | *No description.* | @@ -861,7 +841,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | partition | java.lang.String | *No description.* | | policies | java.util.List | *No description.* | | serviceIdentities | java.util.List | *No description.* | -| tokenType | java.lang.String | *No description.* | | ttl | java.lang.Number | *No description.* | --- @@ -1138,16 +1117,6 @@ public java.util.List getServiceIdentitiesInput(); --- -##### `tokenTypeInput`Optional - -```java -public java.lang.String getTokenTypeInput(); -``` - -- *Type:* java.lang.String - ---- - ##### `ttlInput`Optional ```java @@ -1288,16 +1257,6 @@ public java.util.List getServiceIdentities(); --- -##### `tokenType`Required - -```java -public java.lang.String getTokenType(); -``` - -- *Type:* java.lang.String - ---- - ##### `ttl`Required ```java @@ -1361,7 +1320,6 @@ ConsulSecretBackendRoleConfig.builder() // .partition(java.lang.String) // .policies(java.util.List) // .serviceIdentities(java.util.List) -// .tokenType(java.lang.String) // .ttl(java.lang.Number) .build(); ``` @@ -1382,7 +1340,7 @@ ConsulSecretBackendRoleConfig.builder() | consulNamespace | java.lang.String | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consulPolicies | java.util.List | List of Consul policies to associate with this role. | | consulRoles | java.util.List | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | maxTtl | java.lang.Number | Maximum TTL for leases associated with this role, in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1390,7 +1348,6 @@ ConsulSecretBackendRoleConfig.builder() | partition | java.lang.String | The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. | | policies | java.util.List | List of Consul policies to associate with this role. | | serviceIdentities | java.util.List | Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. | -| tokenType | java.lang.String | Specifies the type of token to create when using this role. Valid values are "client" or "management". | | ttl | java.lang.Number | Specifies the TTL for this role. | --- @@ -1475,7 +1432,7 @@ public java.lang.String getName(); The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1489,7 +1446,7 @@ public java.lang.String getBackend(); The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1503,7 +1460,7 @@ public java.lang.String getConsulNamespace(); The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1517,7 +1474,7 @@ public java.util.List getConsulPolicies(); List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1531,7 +1488,7 @@ public java.util.List getConsulRoles(); Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1543,7 +1500,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1560,7 +1517,7 @@ public java.lang.Object getLocal(); Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1574,7 +1531,7 @@ public java.lang.Number getMaxTtl(); Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1588,7 +1545,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1602,7 +1559,7 @@ public java.util.List getNodeIdentities(); Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1616,7 +1573,7 @@ public java.lang.String getPartition(); The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1630,7 +1587,7 @@ public java.util.List getPolicies(); List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1644,21 +1601,7 @@ public java.util.List getServiceIdentities(); Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} - ---- - -##### `tokenType`Optional - -```java -public java.lang.String getTokenType(); -``` - -- *Type:* java.lang.String - -Specifies the type of token to create when using this role. Valid values are "client" or "management". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1672,7 +1615,7 @@ public java.lang.Number getTtl(); Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/consulSecretBackendRole.python.md b/docs/consulSecretBackendRole.python.md index 83c16b49..92aca7c9 100644 --- a/docs/consulSecretBackendRole.python.md +++ b/docs/consulSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers @@ -34,7 +34,6 @@ consulSecretBackendRole.ConsulSecretBackendRole( partition: str = None, policies: typing.List[str] = None, service_identities: typing.List[str] = None, - token_type: str = None, ttl: typing.Union[int, float] = None ) ``` @@ -55,7 +54,7 @@ consulSecretBackendRole.ConsulSecretBackendRole( | consul_namespace | str | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consul_policies | typing.List[str] | List of Consul policies to associate with this role. | | consul_roles | typing.List[str] | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | max_ttl | typing.Union[int, float] | Maximum TTL for leases associated with this role, in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -63,7 +62,6 @@ consulSecretBackendRole.ConsulSecretBackendRole( | partition | str | The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. | | policies | typing.List[str] | List of Consul policies to associate with this role. | | service_identities | typing.List[str] | Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. | -| token_type | str | Specifies the type of token to create when using this role. Valid values are "client" or "management". | | ttl | typing.Union[int, float] | Specifies the TTL for this role. | --- @@ -134,7 +132,7 @@ Must be unique amongst siblings in the same scope The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -144,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -154,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -164,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -174,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -182,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -195,7 +193,7 @@ If you experience problems setting this value it might not be settable. Please t Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -205,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -215,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -225,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -235,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -245,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -255,17 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} - ---- - -##### `token_type`Optional - -- *Type:* str - -Specifies the type of token to create when using this role. Valid values are "client" or "management". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -275,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- @@ -318,7 +306,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_partition | *No description.* | | reset_policies | *No description.* | | reset_service_identities | *No description.* | -| reset_token_type | *No description.* | | reset_ttl | *No description.* | --- @@ -720,12 +707,6 @@ def reset_policies() -> None def reset_service_identities() -> None ``` -##### `reset_token_type` - -```python -def reset_token_type() -> None -``` - ##### `reset_ttl` ```python @@ -846,7 +827,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -889,7 +870,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | partition_input | str | *No description.* | | policies_input | typing.List[str] | *No description.* | | service_identities_input | typing.List[str] | *No description.* | -| token_type_input | str | *No description.* | | ttl_input | typing.Union[int, float] | *No description.* | | backend | str | *No description.* | | consul_namespace | str | *No description.* | @@ -904,7 +884,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | partition | str | *No description.* | | policies | typing.List[str] | *No description.* | | service_identities | typing.List[str] | *No description.* | -| token_type | str | *No description.* | | ttl | typing.Union[int, float] | *No description.* | --- @@ -1181,16 +1160,6 @@ service_identities_input: typing.List[str] --- -##### `token_type_input`Optional - -```python -token_type_input: str -``` - -- *Type:* str - ---- - ##### `ttl_input`Optional ```python @@ -1331,16 +1300,6 @@ service_identities: typing.List[str] --- -##### `token_type`Required - -```python -token_type: str -``` - -- *Type:* str - ---- - ##### `ttl`Required ```python @@ -1399,7 +1358,6 @@ consulSecretBackendRole.ConsulSecretBackendRoleConfig( partition: str = None, policies: typing.List[str] = None, service_identities: typing.List[str] = None, - token_type: str = None, ttl: typing.Union[int, float] = None ) ``` @@ -1420,7 +1378,7 @@ consulSecretBackendRole.ConsulSecretBackendRoleConfig( | consul_namespace | str | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consul_policies | typing.List[str] | List of Consul policies to associate with this role. | | consul_roles | typing.List[str] | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | max_ttl | typing.Union[int, float] | Maximum TTL for leases associated with this role, in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1428,7 +1386,6 @@ consulSecretBackendRole.ConsulSecretBackendRoleConfig( | partition | str | The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. | | policies | typing.List[str] | List of Consul policies to associate with this role. | | service_identities | typing.List[str] | Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. | -| token_type | str | Specifies the type of token to create when using this role. Valid values are "client" or "management". | | ttl | typing.Union[int, float] | Specifies the TTL for this role. | --- @@ -1513,7 +1470,7 @@ name: str The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1527,7 +1484,7 @@ backend: str The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1541,7 +1498,7 @@ consul_namespace: str The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1555,7 +1512,7 @@ consul_policies: typing.List[str] List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1569,7 +1526,7 @@ consul_roles: typing.List[str] Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1581,7 +1538,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1598,7 +1555,7 @@ local: typing.Union[bool, IResolvable] Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1612,7 +1569,7 @@ max_ttl: typing.Union[int, float] Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1626,7 +1583,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1640,7 +1597,7 @@ node_identities: typing.List[str] Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1654,7 +1611,7 @@ partition: str The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1668,7 +1625,7 @@ policies: typing.List[str] List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1682,21 +1639,7 @@ service_identities: typing.List[str] Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} - ---- - -##### `token_type`Optional - -```python -token_type: str -``` - -- *Type:* str - -Specifies the type of token to create when using this role. Valid values are "client" or "management". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1710,7 +1653,7 @@ ttl: typing.Union[int, float] Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/consulSecretBackendRole.typescript.md b/docs/consulSecretBackendRole.typescript.md index b8999b95..0bdc83f8 100644 --- a/docs/consulSecretBackendRole.typescript.md +++ b/docs/consulSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers @@ -85,7 +85,6 @@ Must be unique amongst siblings in the same scope | resetPartition | *No description.* | | resetPolicies | *No description.* | | resetServiceIdentities | *No description.* | -| resetTokenType | *No description.* | | resetTtl | *No description.* | --- @@ -450,12 +449,6 @@ public resetPolicies(): void public resetServiceIdentities(): void ``` -##### `resetTokenType` - -```typescript -public resetTokenType(): void -``` - ##### `resetTtl` ```typescript @@ -565,7 +558,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -608,7 +601,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | partitionInput | string | *No description.* | | policiesInput | string[] | *No description.* | | serviceIdentitiesInput | string[] | *No description.* | -| tokenTypeInput | string | *No description.* | | ttlInput | number | *No description.* | | backend | string | *No description.* | | consulNamespace | string | *No description.* | @@ -623,7 +615,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | partition | string | *No description.* | | policies | string[] | *No description.* | | serviceIdentities | string[] | *No description.* | -| tokenType | string | *No description.* | | ttl | number | *No description.* | --- @@ -900,16 +891,6 @@ public readonly serviceIdentitiesInput: string[]; --- -##### `tokenTypeInput`Optional - -```typescript -public readonly tokenTypeInput: string; -``` - -- *Type:* string - ---- - ##### `ttlInput`Optional ```typescript @@ -1050,16 +1031,6 @@ public readonly serviceIdentities: string[]; --- -##### `tokenType`Required - -```typescript -public readonly tokenType: string; -``` - -- *Type:* string - ---- - ##### `ttl`Required ```typescript @@ -1116,7 +1087,7 @@ const consulSecretBackendRoleConfig: consulSecretBackendRole.ConsulSecretBackend | consulNamespace | string | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consulPolicies | string[] | List of Consul policies to associate with this role. | | consulRoles | string[] | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | boolean \| cdktf.IResolvable | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | maxTtl | number | Maximum TTL for leases associated with this role, in seconds. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1124,7 +1095,6 @@ const consulSecretBackendRoleConfig: consulSecretBackendRole.ConsulSecretBackend | partition | string | The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. | | policies | string[] | List of Consul policies to associate with this role. | | serviceIdentities | string[] | Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. | -| tokenType | string | Specifies the type of token to create when using this role. Valid values are "client" or "management". | | ttl | number | Specifies the TTL for this role. | --- @@ -1209,7 +1179,7 @@ public readonly name: string; The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1223,7 +1193,7 @@ public readonly backend: string; The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1237,7 +1207,7 @@ public readonly consulNamespace: string; The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1251,7 +1221,7 @@ public readonly consulPolicies: string[]; List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1265,7 +1235,7 @@ public readonly consulRoles: string[]; Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1277,7 +1247,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1294,7 +1264,7 @@ public readonly local: boolean | IResolvable; Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1308,7 +1278,7 @@ public readonly maxTtl: number; Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1322,7 +1292,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1336,7 +1306,7 @@ public readonly nodeIdentities: string[]; Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1350,7 +1320,7 @@ public readonly partition: string; The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1364,7 +1334,7 @@ public readonly policies: string[]; List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1378,21 +1348,7 @@ public readonly serviceIdentities: string[]; Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} - ---- - -##### `tokenType`Optional - -```typescript -public readonly tokenType: string; -``` - -- *Type:* string - -Specifies the type of token to create when using this role. Valid values are "client" or "management". - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1406,7 +1362,7 @@ public readonly ttl: number; Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/dataVaultAdAccessCredentials.csharp.md b/docs/dataVaultAdAccessCredentials.csharp.md index 81e6b23a..81639d41 100644 --- a/docs/dataVaultAdAccessCredentials.csharp.md +++ b/docs/dataVaultAdAccessCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -708,7 +708,7 @@ new DataVaultAdAccessCredentialsConfig { | Provisioners | object[] | *No description.* | | Backend | string | AD Secret Backend to read credentials from. | | Role | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -793,7 +793,7 @@ public string Backend { get; set; } AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -807,7 +807,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -819,7 +819,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -836,7 +836,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultAdAccessCredentials.go.md b/docs/dataVaultAdAccessCredentials.go.md index 3f7e1cb2..ce9925a2 100644 --- a/docs/dataVaultAdAccessCredentials.go.md +++ b/docs/dataVaultAdAccessCredentials.go.md @@ -4,12 +4,12 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultadaccesscredentials" datavaultadaccesscredentials.NewDataVaultAdAccessCredentials(scope Construct, id *string, config DataVaultAdAccessCredentialsConfig) DataVaultAdAccessCredentials ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultadaccesscredentials" datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultadaccesscredentials" datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsTerraformElement(x i ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultadaccesscredentials" datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultadaccesscredentials.DataVaultAdAccessCredentials_IsTerraformDataSource( ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultadaccesscredentials" datavaultadaccesscredentials.DataVaultAdAccessCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -678,7 +678,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultadaccesscredentials" &datavaultadaccesscredentials.DataVaultAdAccessCredentialsConfig { Connection: interface{}, @@ -708,7 +708,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultadaccesscred | Provisioners | *[]interface{} | *No description.* | | Backend | *string | AD Secret Backend to read credentials from. | | Role | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -793,7 +793,7 @@ Backend *string AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -807,7 +807,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -819,7 +819,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -836,7 +836,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultAdAccessCredentials.java.md b/docs/dataVaultAdAccessCredentials.java.md index 0ff67637..a48e0f10 100644 --- a/docs/dataVaultAdAccessCredentials.java.md +++ b/docs/dataVaultAdAccessCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers @@ -43,7 +43,7 @@ DataVaultAdAccessCredentials.Builder.create(Construct scope, java.lang.String id | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AD Secret Backend to read credentials from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -815,7 +815,7 @@ DataVaultAdAccessCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AD Secret Backend to read credentials from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -900,7 +900,7 @@ public java.lang.String getBackend(); AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -914,7 +914,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -926,7 +926,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -943,7 +943,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultAdAccessCredentials.python.md b/docs/dataVaultAdAccessCredentials.python.md index dd71ca7f..5deb921d 100644 --- a/docs/dataVaultAdAccessCredentials.python.md +++ b/docs/dataVaultAdAccessCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers @@ -41,7 +41,7 @@ dataVaultAdAccessCredentials.DataVaultAdAccessCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AD Secret Backend to read credentials from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -845,7 +845,7 @@ dataVaultAdAccessCredentials.DataVaultAdAccessCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AD Secret Backend to read credentials from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -930,7 +930,7 @@ backend: str AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -944,7 +944,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -956,7 +956,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -973,7 +973,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultAdAccessCredentials.typescript.md b/docs/dataVaultAdAccessCredentials.typescript.md index ed347dd4..691fba70 100644 --- a/docs/dataVaultAdAccessCredentials.typescript.md +++ b/docs/dataVaultAdAccessCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -696,7 +696,7 @@ const dataVaultAdAccessCredentialsConfig: dataVaultAdAccessCredentials.DataVault | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | AD Secret Backend to read credentials from. | | role | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -781,7 +781,7 @@ public readonly backend: string; AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -795,7 +795,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -807,7 +807,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -824,7 +824,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.csharp.md b/docs/dataVaultApproleAuthBackendRoleId.csharp.md index 0936a951..20870910 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.csharp.md +++ b/docs/dataVaultApproleAuthBackendRoleId.csharp.md @@ -4,7 +4,7 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -693,7 +693,7 @@ new DataVaultApproleAuthBackendRoleIdConfig { | Provisioners | object[] | *No description.* | | RoleName | string | Name of the role. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -778,7 +778,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -792,7 +792,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -804,7 +804,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -821,7 +821,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.go.md b/docs/dataVaultApproleAuthBackendRoleId.go.md index 9519d02b..b452ea6e 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.go.md +++ b/docs/dataVaultApproleAuthBackendRoleId.go.md @@ -4,12 +4,12 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.NewDataVaultApproleAuthBackendRoleId(scope Construct, id *string, config DataVaultApproleAuthBackendRoleIdConfig) DataVaultApproleAuthBackendRoleId ``` @@ -297,7 +297,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsConstruct(x interface{}) *bool ``` @@ -329,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsTerraformElement(x interface{}) *bool ``` @@ -343,7 +343,7 @@ datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsTerraformE ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsTerraformDataSource(x interface{}) *bool ``` @@ -357,7 +357,7 @@ datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_IsTerraformD ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultapproleauthbackendroleid" datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleId_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -663,7 +663,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthbackendroleid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultapproleauthbackendroleid" &datavaultapproleauthbackendroleid.DataVaultApproleAuthBackendRoleIdConfig { Connection: interface{}, @@ -693,7 +693,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultapproleauthb | Provisioners | *[]interface{} | *No description.* | | RoleName | *string | Name of the role. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -778,7 +778,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -792,7 +792,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -804,7 +804,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -821,7 +821,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.java.md b/docs/dataVaultApproleAuthBackendRoleId.java.md index 71dedd5a..ad06de28 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.java.md +++ b/docs/dataVaultApproleAuthBackendRoleId.java.md @@ -4,7 +4,7 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers @@ -43,7 +43,7 @@ DataVaultApproleAuthBackendRoleId.Builder.create(Construct scope, java.lang.Stri | provisioners | java.util.List | *No description.* | | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- @@ -489,7 +489,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -800,7 +800,7 @@ DataVaultApproleAuthBackendRoleIdConfig.builder() | provisioners | java.util.List | *No description.* | | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -885,7 +885,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -899,7 +899,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -911,7 +911,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -928,7 +928,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.python.md b/docs/dataVaultApproleAuthBackendRoleId.python.md index f1646586..e7b10af2 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.python.md +++ b/docs/dataVaultApproleAuthBackendRoleId.python.md @@ -4,7 +4,7 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers @@ -41,7 +41,7 @@ dataVaultApproleAuthBackendRoleId.DataVaultApproleAuthBackendRoleId( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- @@ -523,7 +523,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ dataVaultApproleAuthBackendRoleId.DataVaultApproleAuthBackendRoleIdConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -929,7 +929,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -941,7 +941,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -958,7 +958,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.typescript.md b/docs/dataVaultApproleAuthBackendRoleId.typescript.md index 46368829..3b7e3bfa 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.typescript.md +++ b/docs/dataVaultApproleAuthBackendRoleId.typescript.md @@ -4,7 +4,7 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -681,7 +681,7 @@ const dataVaultApproleAuthBackendRoleIdConfig: dataVaultApproleAuthBackendRoleId | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | roleName | string | Name of the role. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -766,7 +766,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -780,7 +780,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -792,7 +792,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -809,7 +809,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultAuthBackend.csharp.md b/docs/dataVaultAuthBackend.csharp.md index 23183cfd..4e62c43d 100644 --- a/docs/dataVaultAuthBackend.csharp.md +++ b/docs/dataVaultAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -728,7 +728,7 @@ new DataVaultAuthBackendConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Path | string | The auth backend mount point. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -813,7 +813,7 @@ public string Path { get; set; } The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -825,7 +825,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -842,7 +842,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackend.go.md b/docs/dataVaultAuthBackend.go.md index 60901587..33d38301 100644 --- a/docs/dataVaultAuthBackend.go.md +++ b/docs/dataVaultAuthBackend.go.md @@ -4,12 +4,12 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackend" datavaultauthbackend.NewDataVaultAuthBackend(scope Construct, id *string, config DataVaultAuthBackendConfig) DataVaultAuthBackend ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackend" datavaultauthbackend.DataVaultAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackend" datavaultauthbackend.DataVaultAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultauthbackend.DataVaultAuthBackend_IsTerraformElement(x interface{}) *boo ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackend" datavaultauthbackend.DataVaultAuthBackend_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultauthbackend.DataVaultAuthBackend_IsTerraformDataSource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackend" datavaultauthbackend.DataVaultAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -700,7 +700,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackend" &datavaultauthbackend.DataVaultAuthBackendConfig { Connection: interface{}, @@ -728,7 +728,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackend" | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Path | *string | The auth backend mount point. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -813,7 +813,7 @@ Path *string The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -825,7 +825,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -842,7 +842,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackend.java.md b/docs/dataVaultAuthBackend.java.md index e05adec7..7955af9b 100644 --- a/docs/dataVaultAuthBackend.java.md +++ b/docs/dataVaultAuthBackend.java.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers @@ -41,7 +41,7 @@ DataVaultAuthBackend.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | The auth backend mount point. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ DataVaultAuthBackendConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | The auth backend mount point. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -908,7 +908,7 @@ public java.lang.String getPath(); The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -920,7 +920,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -937,7 +937,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackend.python.md b/docs/dataVaultAuthBackend.python.md index f9dd0953..24753abd 100644 --- a/docs/dataVaultAuthBackend.python.md +++ b/docs/dataVaultAuthBackend.python.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers @@ -39,7 +39,7 @@ dataVaultAuthBackend.DataVaultAuthBackend( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | The auth backend mount point. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -853,7 +853,7 @@ dataVaultAuthBackend.DataVaultAuthBackendConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | The auth backend mount point. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -938,7 +938,7 @@ path: str The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -950,7 +950,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -967,7 +967,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackend.typescript.md b/docs/dataVaultAuthBackend.typescript.md index 8c2f2540..1d3c8db6 100644 --- a/docs/dataVaultAuthBackend.typescript.md +++ b/docs/dataVaultAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -717,7 +717,7 @@ const dataVaultAuthBackendConfig: dataVaultAuthBackend.DataVaultAuthBackendConfi | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | The auth backend mount point. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -802,7 +802,7 @@ public readonly path: string; The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -814,7 +814,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -831,7 +831,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackends.csharp.md b/docs/dataVaultAuthBackends.csharp.md index d19683e4..dc705d49 100644 --- a/docs/dataVaultAuthBackends.csharp.md +++ b/docs/dataVaultAuthBackends.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -679,7 +679,7 @@ new DataVaultAuthBackendsConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Type | string | The type of the auth backend. | @@ -763,7 +763,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -780,7 +780,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -794,7 +794,7 @@ public string Type { get; set; } The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAuthBackends.go.md b/docs/dataVaultAuthBackends.go.md index edbe7b33..73856fc1 100644 --- a/docs/dataVaultAuthBackends.go.md +++ b/docs/dataVaultAuthBackends.go.md @@ -4,12 +4,12 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackends" datavaultauthbackends.NewDataVaultAuthBackends(scope Construct, id *string, config DataVaultAuthBackendsConfig) DataVaultAuthBackends ``` @@ -297,7 +297,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackends" datavaultauthbackends.DataVaultAuthBackends_IsConstruct(x interface{}) *bool ``` @@ -329,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackends" datavaultauthbackends.DataVaultAuthBackends_IsTerraformElement(x interface{}) *bool ``` @@ -343,7 +343,7 @@ datavaultauthbackends.DataVaultAuthBackends_IsTerraformElement(x interface{}) *b ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackends" datavaultauthbackends.DataVaultAuthBackends_IsTerraformDataSource(x interface{}) *bool ``` @@ -357,7 +357,7 @@ datavaultauthbackends.DataVaultAuthBackends_IsTerraformDataSource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackends" datavaultauthbackends.DataVaultAuthBackends_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -652,7 +652,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackends" &datavaultauthbackends.DataVaultAuthBackendsConfig { Connection: interface{}, @@ -679,7 +679,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultauthbackends | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Type | *string | The type of the auth backend. | @@ -763,7 +763,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -780,7 +780,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -794,7 +794,7 @@ Type *string The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAuthBackends.java.md b/docs/dataVaultAuthBackends.java.md index 5a449ab1..bdf33f33 100644 --- a/docs/dataVaultAuthBackends.java.md +++ b/docs/dataVaultAuthBackends.java.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers @@ -40,7 +40,7 @@ DataVaultAuthBackends.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | type | java.lang.String | The type of the auth backend. | @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -123,7 +123,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- @@ -477,7 +477,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -774,7 +774,7 @@ DataVaultAuthBackendsConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | type | java.lang.String | The type of the auth backend. | @@ -858,7 +858,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -875,7 +875,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -889,7 +889,7 @@ public java.lang.String getType(); The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAuthBackends.python.md b/docs/dataVaultAuthBackends.python.md index 01c0f06f..934c9de1 100644 --- a/docs/dataVaultAuthBackends.python.md +++ b/docs/dataVaultAuthBackends.python.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers @@ -38,7 +38,7 @@ dataVaultAuthBackends.DataVaultAuthBackends( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | str | Target namespace. (requires Enterprise). | | type | str | The type of the auth backend. | @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- @@ -511,7 +511,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -804,7 +804,7 @@ dataVaultAuthBackends.DataVaultAuthBackendsConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | str | Target namespace. (requires Enterprise). | | type | str | The type of the auth backend. | @@ -888,7 +888,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -905,7 +905,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -919,7 +919,7 @@ type: str The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAuthBackends.typescript.md b/docs/dataVaultAuthBackends.typescript.md index 51f5f85b..4b795e82 100644 --- a/docs/dataVaultAuthBackends.typescript.md +++ b/docs/dataVaultAuthBackends.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -668,7 +668,7 @@ const dataVaultAuthBackendsConfig: dataVaultAuthBackends.DataVaultAuthBackendsCo | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | string | Target namespace. (requires Enterprise). | | type | string | The type of the auth backend. | @@ -752,7 +752,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -769,7 +769,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -783,7 +783,7 @@ public readonly type: string; The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.csharp.md b/docs/dataVaultAwsAccessCredentials.csharp.md index 4fad79ec..700f4245 100644 --- a/docs/dataVaultAwsAccessCredentials.csharp.md +++ b/docs/dataVaultAwsAccessCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers @@ -407,7 +407,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -872,7 +872,7 @@ new DataVaultAwsAccessCredentialsConfig { | Provisioners | object[] | *No description.* | | Backend | string | AWS Secret Backend to read credentials from. | | Role | string | AWS Secret Role to read credentials from. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Region | string | Region the read credentials belong to. | | RoleArn | string | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -961,7 +961,7 @@ public string Backend { get; set; } AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -975,7 +975,7 @@ public string Role { get; set; } AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -987,7 +987,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1018,7 +1018,7 @@ public string Region { get; set; } Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1032,7 +1032,7 @@ public string RoleArn { get; set; } ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1046,7 +1046,7 @@ public string Ttl { get; set; } User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1060,7 +1060,7 @@ public string Type { get; set; } Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.go.md b/docs/dataVaultAwsAccessCredentials.go.md index 37f6d56b..79ccfb3c 100644 --- a/docs/dataVaultAwsAccessCredentials.go.md +++ b/docs/dataVaultAwsAccessCredentials.go.md @@ -4,12 +4,12 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsaccesscredentials" datavaultawsaccesscredentials.NewDataVaultAwsAccessCredentials(scope Construct, id *string, config DataVaultAwsAccessCredentialsConfig) DataVaultAwsAccessCredentials ``` @@ -318,7 +318,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsaccesscredentials" datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsConstruct(x interface{}) *bool ``` @@ -350,7 +350,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsaccesscredentials" datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -364,7 +364,7 @@ datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsTerraformElement(x ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsaccesscredentials" datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -378,7 +378,7 @@ datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_IsTerraformDataSourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsaccesscredentials" datavaultawsaccesscredentials.DataVaultAwsAccessCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -407,7 +407,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -838,7 +838,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsaccesscredentials" &datavaultawsaccesscredentials.DataVaultAwsAccessCredentialsConfig { Connection: interface{}, @@ -872,7 +872,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsaccesscre | Provisioners | *[]interface{} | *No description.* | | Backend | *string | AWS Secret Backend to read credentials from. | | Role | *string | AWS Secret Role to read credentials from. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Region | *string | Region the read credentials belong to. | | RoleArn | *string | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -961,7 +961,7 @@ Backend *string AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -975,7 +975,7 @@ Role *string AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -987,7 +987,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1018,7 +1018,7 @@ Region *string Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1032,7 +1032,7 @@ RoleArn *string ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1046,7 +1046,7 @@ Ttl *string User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1060,7 +1060,7 @@ Type *string Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.java.md b/docs/dataVaultAwsAccessCredentials.java.md index 9d6931cf..b974ac01 100644 --- a/docs/dataVaultAwsAccessCredentials.java.md +++ b/docs/dataVaultAwsAccessCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers @@ -47,7 +47,7 @@ DataVaultAwsAccessCredentials.Builder.create(Construct scope, java.lang.String i | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AWS Secret Backend to read credentials from. | | role | java.lang.String | AWS Secret Role to read credentials from. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | region | java.lang.String | Region the read credentials belong to. | | roleArn | java.lang.String | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- @@ -558,7 +558,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -1027,7 +1027,7 @@ DataVaultAwsAccessCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AWS Secret Backend to read credentials from. | | role | java.lang.String | AWS Secret Role to read credentials from. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | region | java.lang.String | Region the read credentials belong to. | | roleArn | java.lang.String | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -1116,7 +1116,7 @@ public java.lang.String getBackend(); AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -1130,7 +1130,7 @@ public java.lang.String getRole(); AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -1142,7 +1142,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1159,7 +1159,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1173,7 +1173,7 @@ public java.lang.String getRegion(); Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1187,7 +1187,7 @@ public java.lang.String getRoleArn(); ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1201,7 +1201,7 @@ public java.lang.String getTtl(); User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1215,7 +1215,7 @@ public java.lang.String getType(); Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.python.md b/docs/dataVaultAwsAccessCredentials.python.md index c709f178..b9d95e76 100644 --- a/docs/dataVaultAwsAccessCredentials.python.md +++ b/docs/dataVaultAwsAccessCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers @@ -45,7 +45,7 @@ dataVaultAwsAccessCredentials.DataVaultAwsAccessCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AWS Secret Backend to read credentials from. | | role | str | AWS Secret Role to read credentials from. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | | region | str | Region the read credentials belong to. | | role_arn | str | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -151,7 +151,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- @@ -592,7 +592,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -1057,7 +1057,7 @@ dataVaultAwsAccessCredentials.DataVaultAwsAccessCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AWS Secret Backend to read credentials from. | | role | str | AWS Secret Role to read credentials from. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | | region | str | Region the read credentials belong to. | | role_arn | str | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -1146,7 +1146,7 @@ backend: str AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -1160,7 +1160,7 @@ role: str AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -1172,7 +1172,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1189,7 +1189,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1203,7 +1203,7 @@ region: str Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1217,7 +1217,7 @@ role_arn: str ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1231,7 +1231,7 @@ ttl: str User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1245,7 +1245,7 @@ type: str Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.typescript.md b/docs/dataVaultAwsAccessCredentials.typescript.md index 45716eca..ecc3152b 100644 --- a/docs/dataVaultAwsAccessCredentials.typescript.md +++ b/docs/dataVaultAwsAccessCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers @@ -407,7 +407,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -856,7 +856,7 @@ const dataVaultAwsAccessCredentialsConfig: dataVaultAwsAccessCredentials.DataVau | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | AWS Secret Backend to read credentials from. | | role | string | AWS Secret Role to read credentials from. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | | region | string | Region the read credentials belong to. | | roleArn | string | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -945,7 +945,7 @@ public readonly backend: string; AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -959,7 +959,7 @@ public readonly role: string; AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -971,7 +971,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -988,7 +988,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1002,7 +1002,7 @@ public readonly region: string; Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1016,7 +1016,7 @@ public readonly roleArn: string; ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1030,7 +1030,7 @@ public readonly ttl: string; User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1044,7 +1044,7 @@ public readonly type: string; Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.csharp.md b/docs/dataVaultAwsStaticAccessCredentials.csharp.md index 85d65f12..0748de78 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.csharp.md +++ b/docs/dataVaultAwsStaticAccessCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -697,7 +697,7 @@ new DataVaultAwsStaticAccessCredentialsConfig { | Provisioners | object[] | *No description.* | | Backend | string | AWS Secret Backend to read credentials from. | | Name | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -782,7 +782,7 @@ public string Backend { get; set; } AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -796,7 +796,7 @@ public string Name { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -808,7 +808,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -825,7 +825,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.go.md b/docs/dataVaultAwsStaticAccessCredentials.go.md index 804be4eb..7568d57f 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.go.md +++ b/docs/dataVaultAwsStaticAccessCredentials.go.md @@ -4,12 +4,12 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.NewDataVaultAwsStaticAccessCredentials(scope Construct, id *string, config DataVaultAwsStaticAccessCredentialsConfig) DataVaultAwsStaticAccessCredentials ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsTerraf ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_IsTerraf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsstaticaccesscredentials" datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -667,7 +667,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsstaticaccesscredentials" &datavaultawsstaticaccesscredentials.DataVaultAwsStaticAccessCredentialsConfig { Connection: interface{}, @@ -697,7 +697,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultawsstaticacc | Provisioners | *[]interface{} | *No description.* | | Backend | *string | AWS Secret Backend to read credentials from. | | Name | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -782,7 +782,7 @@ Backend *string AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -796,7 +796,7 @@ Name *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -808,7 +808,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -825,7 +825,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.java.md b/docs/dataVaultAwsStaticAccessCredentials.java.md index fab098a3..3ec9a821 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.java.md +++ b/docs/dataVaultAwsStaticAccessCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers @@ -43,7 +43,7 @@ DataVaultAwsStaticAccessCredentials.Builder.create(Construct scope, java.lang.St | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AWS Secret Backend to read credentials from. | | name | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -804,7 +804,7 @@ DataVaultAwsStaticAccessCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AWS Secret Backend to read credentials from. | | name | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -889,7 +889,7 @@ public java.lang.String getBackend(); AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -903,7 +903,7 @@ public java.lang.String getName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -915,7 +915,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -932,7 +932,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.python.md b/docs/dataVaultAwsStaticAccessCredentials.python.md index c5db4180..33710d3d 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.python.md +++ b/docs/dataVaultAwsStaticAccessCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers @@ -41,7 +41,7 @@ dataVaultAwsStaticAccessCredentials.DataVaultAwsStaticAccessCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AWS Secret Backend to read credentials from. | | name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ dataVaultAwsStaticAccessCredentials.DataVaultAwsStaticAccessCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AWS Secret Backend to read credentials from. | | name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -919,7 +919,7 @@ backend: str AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -933,7 +933,7 @@ name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -945,7 +945,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -962,7 +962,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.typescript.md b/docs/dataVaultAwsStaticAccessCredentials.typescript.md index 69c28f5c..5bf8f41a 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.typescript.md +++ b/docs/dataVaultAwsStaticAccessCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -685,7 +685,7 @@ const dataVaultAwsStaticAccessCredentialsConfig: dataVaultAwsStaticAccessCredent | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | AWS Secret Backend to read credentials from. | | name | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -770,7 +770,7 @@ public readonly backend: string; AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -784,7 +784,7 @@ public readonly name: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -796,7 +796,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -813,7 +813,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAzureAccessCredentials.csharp.md b/docs/dataVaultAzureAccessCredentials.csharp.md index 41801f56..e443fa17 100644 --- a/docs/dataVaultAzureAccessCredentials.csharp.md +++ b/docs/dataVaultAzureAccessCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers @@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -952,7 +952,7 @@ new DataVaultAzureAccessCredentialsConfig { | Backend | string | Azure Secret Backend to read credentials from. | | Role | string | Azure Secret Role to read credentials from. | | Environment | string | The Azure environment to use during credential validation. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | MaxCredValidationSeconds | double | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | Namespace | string | Target namespace. (requires Enterprise). | | NumSecondsBetweenTests | double | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1043,7 +1043,7 @@ public string Backend { get; set; } Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1057,7 +1057,7 @@ public string Role { get; set; } Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1074,7 +1074,7 @@ The Azure environment to use during credential validation. Defaults to the environment configured in the Vault backend. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1086,7 +1086,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1103,7 +1103,7 @@ public double MaxCredValidationSeconds { get; set; } If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1117,7 +1117,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1131,7 +1131,7 @@ public double NumSecondsBetweenTests { get; set; } If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1145,7 +1145,7 @@ public double NumSequentialSuccesses { get; set; } If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1159,7 +1159,7 @@ public string SubscriptionId { get; set; } The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1173,7 +1173,7 @@ public string TenantId { get; set; } The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1187,7 +1187,7 @@ public object ValidateCreds { get; set; } Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultAzureAccessCredentials.go.md b/docs/dataVaultAzureAccessCredentials.go.md index f06c7087..dbc97eef 100644 --- a/docs/dataVaultAzureAccessCredentials.go.md +++ b/docs/dataVaultAzureAccessCredentials.go.md @@ -4,12 +4,12 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultazureaccesscredentials" datavaultazureaccesscredentials.NewDataVaultAzureAccessCredentials(scope Construct, id *string, config DataVaultAzureAccessCredentialsConfig) DataVaultAzureAccessCredentials ``` @@ -339,7 +339,7 @@ func ResetValidateCreds() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultazureaccesscredentials" datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsConstruct(x interface{}) *bool ``` @@ -371,7 +371,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultazureaccesscredentials" datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -385,7 +385,7 @@ datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsTerraformEleme ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultazureaccesscredentials" datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -399,7 +399,7 @@ datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_IsTerraformDataS ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultazureaccesscredentials" datavaultazureaccesscredentials.DataVaultAzureAccessCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccesscredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultazureaccesscredentials" &datavaultazureaccesscredentials.DataVaultAzureAccessCredentialsConfig { Connection: interface{}, @@ -952,7 +952,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultazureaccessc | Backend | *string | Azure Secret Backend to read credentials from. | | Role | *string | Azure Secret Role to read credentials from. | | Environment | *string | The Azure environment to use during credential validation. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | MaxCredValidationSeconds | *f64 | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | Namespace | *string | Target namespace. (requires Enterprise). | | NumSecondsBetweenTests | *f64 | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1043,7 +1043,7 @@ Backend *string Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1057,7 +1057,7 @@ Role *string Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1074,7 +1074,7 @@ The Azure environment to use during credential validation. Defaults to the environment configured in the Vault backend. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1086,7 +1086,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1103,7 +1103,7 @@ MaxCredValidationSeconds *f64 If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1117,7 +1117,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1131,7 +1131,7 @@ NumSecondsBetweenTests *f64 If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1145,7 +1145,7 @@ NumSequentialSuccesses *f64 If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1159,7 +1159,7 @@ SubscriptionId *string The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1173,7 +1173,7 @@ TenantId *string The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1187,7 +1187,7 @@ ValidateCreds interface{} Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultAzureAccessCredentials.java.md b/docs/dataVaultAzureAccessCredentials.java.md index 466bccb1..39b162ea 100644 --- a/docs/dataVaultAzureAccessCredentials.java.md +++ b/docs/dataVaultAzureAccessCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers @@ -52,7 +52,7 @@ DataVaultAzureAccessCredentials.Builder.create(Construct scope, java.lang.String | backend | java.lang.String | Azure Secret Backend to read credentials from. | | role | java.lang.String | Azure Secret Role to read credentials from. | | environment | java.lang.String | The Azure environment to use during credential validation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | maxCredValidationSeconds | java.lang.Number | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | numSecondsBetweenTests | java.lang.Number | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -129,7 +129,7 @@ Must be unique amongst siblings in the same scope Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -139,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -152,7 +152,7 @@ The Azure environment to use during credential validation. Defaults to the environment configured in the Vault backend. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- @@ -619,7 +619,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -1148,7 +1148,7 @@ DataVaultAzureAccessCredentialsConfig.builder() | backend | java.lang.String | Azure Secret Backend to read credentials from. | | role | java.lang.String | Azure Secret Role to read credentials from. | | environment | java.lang.String | The Azure environment to use during credential validation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | maxCredValidationSeconds | java.lang.Number | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | numSecondsBetweenTests | java.lang.Number | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1239,7 +1239,7 @@ public java.lang.String getBackend(); Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1253,7 +1253,7 @@ public java.lang.String getRole(); Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1270,7 +1270,7 @@ The Azure environment to use during credential validation. Defaults to the environment configured in the Vault backend. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1282,7 +1282,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1299,7 +1299,7 @@ public java.lang.Number getMaxCredValidationSeconds(); If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1313,7 +1313,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1327,7 +1327,7 @@ public java.lang.Number getNumSecondsBetweenTests(); If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1341,7 +1341,7 @@ public java.lang.Number getNumSequentialSuccesses(); If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1355,7 +1355,7 @@ public java.lang.String getSubscriptionId(); The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1369,7 +1369,7 @@ public java.lang.String getTenantId(); The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1383,7 +1383,7 @@ public java.lang.Object getValidateCreds(); Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultAzureAccessCredentials.python.md b/docs/dataVaultAzureAccessCredentials.python.md index e299fbe5..efdd8d36 100644 --- a/docs/dataVaultAzureAccessCredentials.python.md +++ b/docs/dataVaultAzureAccessCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers @@ -49,7 +49,7 @@ dataVaultAzureAccessCredentials.DataVaultAzureAccessCredentials( | backend | str | Azure Secret Backend to read credentials from. | | role | str | Azure Secret Role to read credentials from. | | environment | str | The Azure environment to use during credential validation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | max_cred_validation_seconds | typing.Union[int, float] | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | str | Target namespace. (requires Enterprise). | | num_seconds_between_tests | typing.Union[int, float] | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -149,7 +149,7 @@ The Azure environment to use during credential validation. Defaults to the environment configured in the Vault backend. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -170,7 +170,7 @@ If you experience problems setting this value it might not be settable. Please t If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- @@ -652,7 +652,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -1176,7 +1176,7 @@ dataVaultAzureAccessCredentials.DataVaultAzureAccessCredentialsConfig( | backend | str | Azure Secret Backend to read credentials from. | | role | str | Azure Secret Role to read credentials from. | | environment | str | The Azure environment to use during credential validation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | max_cred_validation_seconds | typing.Union[int, float] | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | str | Target namespace. (requires Enterprise). | | num_seconds_between_tests | typing.Union[int, float] | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1267,7 +1267,7 @@ backend: str Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1281,7 +1281,7 @@ role: str Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1298,7 +1298,7 @@ The Azure environment to use during credential validation. Defaults to the environment configured in the Vault backend. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1310,7 +1310,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1327,7 +1327,7 @@ max_cred_validation_seconds: typing.Union[int, float] If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1341,7 +1341,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1355,7 +1355,7 @@ num_seconds_between_tests: typing.Union[int, float] If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1369,7 +1369,7 @@ num_sequential_successes: typing.Union[int, float] If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1383,7 +1383,7 @@ subscription_id: str The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1397,7 +1397,7 @@ tenant_id: str The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1411,7 +1411,7 @@ validate_creds: typing.Union[bool, IResolvable] Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultAzureAccessCredentials.typescript.md b/docs/dataVaultAzureAccessCredentials.typescript.md index a462ce17..0de0079f 100644 --- a/docs/dataVaultAzureAccessCredentials.typescript.md +++ b/docs/dataVaultAzureAccessCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers @@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -933,7 +933,7 @@ const dataVaultAzureAccessCredentialsConfig: dataVaultAzureAccessCredentials.Dat | backend | string | Azure Secret Backend to read credentials from. | | role | string | Azure Secret Role to read credentials from. | | environment | string | The Azure environment to use during credential validation. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | maxCredValidationSeconds | number | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | string | Target namespace. (requires Enterprise). | | numSecondsBetweenTests | number | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1024,7 +1024,7 @@ public readonly backend: string; Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1038,7 +1038,7 @@ public readonly role: string; Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1055,7 +1055,7 @@ The Azure environment to use during credential validation. Defaults to the environment configured in the Vault backend. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1067,7 +1067,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1084,7 +1084,7 @@ public readonly maxCredValidationSeconds: number; If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1098,7 +1098,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1112,7 +1112,7 @@ public readonly numSecondsBetweenTests: number; If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1126,7 +1126,7 @@ public readonly numSequentialSuccesses: number; If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1140,7 +1140,7 @@ public readonly subscriptionId: string; The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1154,7 +1154,7 @@ public readonly tenantId: string; The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1168,7 +1168,7 @@ public readonly validateCreds: boolean | IResolvable; Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultGcpAuthBackendRole.csharp.md b/docs/dataVaultGcpAuthBackendRole.csharp.md index 1e56332b..b1849382 100644 --- a/docs/dataVaultGcpAuthBackendRole.csharp.md +++ b/docs/dataVaultGcpAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -449,7 +449,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1040,7 +1040,7 @@ new DataVaultGcpAuthBackendRoleConfig { | Provisioners | object[] | *No description.* | | RoleName | string | Name of the role. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1134,7 +1134,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1148,7 +1148,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1160,7 +1160,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1177,7 +1177,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1191,7 +1191,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1205,7 +1205,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1219,7 +1219,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1233,7 +1233,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1247,7 +1247,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1261,7 +1261,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1275,7 +1275,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1289,7 +1289,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1303,7 +1303,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGcpAuthBackendRole.go.md b/docs/dataVaultGcpAuthBackendRole.go.md index cd5ed7b0..7ab88d6d 100644 --- a/docs/dataVaultGcpAuthBackendRole.go.md +++ b/docs/dataVaultGcpAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.NewDataVaultGcpAuthBackendRole(scope Construct, id *string, config DataVaultGcpAuthBackendRoleConfig) DataVaultGcpAuthBackendRole ``` @@ -360,7 +360,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -392,7 +392,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -406,7 +406,7 @@ datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsTerraformElement(x int ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsTerraformDataSource(x interface{}) *bool ``` @@ -420,7 +420,7 @@ datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_IsTerraformDataSource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgcpauthbackendrole" datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -449,7 +449,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1001,7 +1001,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgcpauthbackendrole" &datavaultgcpauthbackendrole.DataVaultGcpAuthBackendRoleConfig { Connection: interface{}, @@ -1040,7 +1040,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgcpauthbacke | Provisioners | *[]interface{} | *No description.* | | RoleName | *string | Name of the role. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1134,7 +1134,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1148,7 +1148,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1160,7 +1160,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1177,7 +1177,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1191,7 +1191,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1205,7 +1205,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1219,7 +1219,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1233,7 +1233,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1247,7 +1247,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1261,7 +1261,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1275,7 +1275,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1289,7 +1289,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1303,7 +1303,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGcpAuthBackendRole.java.md b/docs/dataVaultGcpAuthBackendRole.java.md index 336c7bd6..e8579a67 100644 --- a/docs/dataVaultGcpAuthBackendRole.java.md +++ b/docs/dataVaultGcpAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -53,7 +53,7 @@ DataVaultGcpAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -133,7 +133,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -164,7 +164,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -224,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -244,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1257,7 +1257,7 @@ DataVaultGcpAuthBackendRoleConfig.builder() | provisioners | java.util.List | *No description.* | | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1351,7 +1351,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1365,7 +1365,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1377,7 +1377,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1394,7 +1394,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1408,7 +1408,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1422,7 +1422,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1436,7 +1436,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1450,7 +1450,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1464,7 +1464,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1478,7 +1478,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1492,7 +1492,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1506,7 +1506,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1520,7 +1520,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGcpAuthBackendRole.python.md b/docs/dataVaultGcpAuthBackendRole.python.md index 38087307..541b80a5 100644 --- a/docs/dataVaultGcpAuthBackendRole.python.md +++ b/docs/dataVaultGcpAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -50,7 +50,7 @@ dataVaultGcpAuthBackendRole.DataVaultGcpAuthBackendRole( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- @@ -694,7 +694,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1285,7 +1285,7 @@ dataVaultGcpAuthBackendRole.DataVaultGcpAuthBackendRoleConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1379,7 +1379,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1393,7 +1393,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1405,7 +1405,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1422,7 +1422,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1436,7 +1436,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1450,7 +1450,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1464,7 +1464,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1478,7 +1478,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1492,7 +1492,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1506,7 +1506,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1520,7 +1520,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1534,7 +1534,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1548,7 +1548,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGcpAuthBackendRole.typescript.md b/docs/dataVaultGcpAuthBackendRole.typescript.md index c7eef012..aaf06d41 100644 --- a/docs/dataVaultGcpAuthBackendRole.typescript.md +++ b/docs/dataVaultGcpAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -449,7 +449,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1019,7 +1019,7 @@ const dataVaultGcpAuthBackendRoleConfig: dataVaultGcpAuthBackendRole.DataVaultGc | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | roleName | string | Name of the role. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1113,7 +1113,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1127,7 +1127,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1139,7 +1139,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1156,7 +1156,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1170,7 +1170,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1184,7 +1184,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1198,7 +1198,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1212,7 +1212,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1226,7 +1226,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1240,7 +1240,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1254,7 +1254,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1268,7 +1268,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1282,7 +1282,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGenericSecret.csharp.md b/docs/dataVaultGenericSecret.csharp.md index 92084e4a..a0bbd1a5 100644 --- a/docs/dataVaultGenericSecret.csharp.md +++ b/docs/dataVaultGenericSecret.csharp.md @@ -4,7 +4,7 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -777,9 +777,9 @@ new DataVaultGenericSecretConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Path | string | Full path from which a secret will be read. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | Namespace | string | Target namespace. (requires Enterprise). | -| Version | double | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| Version | double | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | WithLeaseStartTime | object | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -864,7 +864,7 @@ public string Path { get; set; } Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -876,7 +876,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -893,7 +893,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -905,7 +905,7 @@ public double Version { get; set; } - *Type:* double -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -919,7 +919,7 @@ public object WithLeaseStartTime { get; set; } If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultGenericSecret.go.md b/docs/dataVaultGenericSecret.go.md index 5645e59c..f8fbef78 100644 --- a/docs/dataVaultGenericSecret.go.md +++ b/docs/dataVaultGenericSecret.go.md @@ -4,12 +4,12 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgenericsecret" datavaultgenericsecret.NewDataVaultGenericSecret(scope Construct, id *string, config DataVaultGenericSecretConfig) DataVaultGenericSecret ``` @@ -304,7 +304,7 @@ func ResetWithLeaseStartTime() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgenericsecret" datavaultgenericsecret.DataVaultGenericSecret_IsConstruct(x interface{}) *bool ``` @@ -336,7 +336,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgenericsecret" datavaultgenericsecret.DataVaultGenericSecret_IsTerraformElement(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultgenericsecret.DataVaultGenericSecret_IsTerraformElement(x interface{}) ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgenericsecret" datavaultgenericsecret.DataVaultGenericSecret_IsTerraformDataSource(x interface{}) *bool ``` @@ -364,7 +364,7 @@ datavaultgenericsecret.DataVaultGenericSecret_IsTerraformDataSource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgenericsecret" datavaultgenericsecret.DataVaultGenericSecret_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -747,7 +747,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgenericsecret" &datavaultgenericsecret.DataVaultGenericSecretConfig { Connection: interface{}, @@ -777,9 +777,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultgenericsecre | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Path | *string | Full path from which a secret will be read. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Version | *f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| Version | *f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | WithLeaseStartTime | interface{} | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -864,7 +864,7 @@ Path *string Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -876,7 +876,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -893,7 +893,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -905,7 +905,7 @@ Version *f64 - *Type:* *f64 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -919,7 +919,7 @@ WithLeaseStartTime interface{} If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultGenericSecret.java.md b/docs/dataVaultGenericSecret.java.md index c5921430..76dae837 100644 --- a/docs/dataVaultGenericSecret.java.md +++ b/docs/dataVaultGenericSecret.java.md @@ -4,7 +4,7 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers @@ -44,9 +44,9 @@ DataVaultGenericSecret.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full path from which a secret will be read. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| version | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | withLeaseStartTime | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -125,7 +125,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -138,7 +138,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- @@ -507,7 +507,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -896,9 +896,9 @@ DataVaultGenericSecretConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full path from which a secret will be read. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| version | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | withLeaseStartTime | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -983,7 +983,7 @@ public java.lang.String getPath(); Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -995,7 +995,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1012,7 +1012,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -1024,7 +1024,7 @@ public java.lang.Number getVersion(); - *Type:* java.lang.Number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -1038,7 +1038,7 @@ public java.lang.Object getWithLeaseStartTime(); If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultGenericSecret.python.md b/docs/dataVaultGenericSecret.python.md index 604044eb..0837d8b3 100644 --- a/docs/dataVaultGenericSecret.python.md +++ b/docs/dataVaultGenericSecret.python.md @@ -4,7 +4,7 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers @@ -41,9 +41,9 @@ dataVaultGenericSecret.DataVaultGenericSecret( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full path from which a secret will be read. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| version | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | with_lease_start_time | typing.Union[bool, cdktf.IResolvable] | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -135,7 +135,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[int, float] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- @@ -540,7 +540,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -924,9 +924,9 @@ dataVaultGenericSecret.DataVaultGenericSecretConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full path from which a secret will be read. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| version | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | with_lease_start_time | typing.Union[bool, cdktf.IResolvable] | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -1011,7 +1011,7 @@ path: str Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -1023,7 +1023,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1040,7 +1040,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -1052,7 +1052,7 @@ version: typing.Union[int, float] - *Type:* typing.Union[int, float] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -1066,7 +1066,7 @@ with_lease_start_time: typing.Union[bool, IResolvable] If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultGenericSecret.typescript.md b/docs/dataVaultGenericSecret.typescript.md index f913af40..39e2b6e4 100644 --- a/docs/dataVaultGenericSecret.typescript.md +++ b/docs/dataVaultGenericSecret.typescript.md @@ -4,7 +4,7 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -764,9 +764,9 @@ const dataVaultGenericSecretConfig: dataVaultGenericSecret.DataVaultGenericSecre | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | Full path from which a secret will be read. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | string | Target namespace. (requires Enterprise). | -| version | number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | withLeaseStartTime | boolean \| cdktf.IResolvable | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -851,7 +851,7 @@ public readonly path: string; Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -863,7 +863,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -880,7 +880,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -892,7 +892,7 @@ public readonly version: number; - *Type:* number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -906,7 +906,7 @@ public readonly withLeaseStartTime: boolean | IResolvable; If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultIdentityEntity.csharp.md b/docs/dataVaultIdentityEntity.csharp.md index 4fe16197..2c895fff 100644 --- a/docs/dataVaultIdentityEntity.csharp.md +++ b/docs/dataVaultIdentityEntity.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -927,7 +927,7 @@ new DataVaultIdentityEntityConfig { | AliasName | string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | EntityId | string | ID of the entity. | | EntityName | string | Name of the entity. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -1012,7 +1012,7 @@ public string AliasId { get; set; } ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1026,7 +1026,7 @@ public string AliasMountAccessor { get; set; } Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1040,7 +1040,7 @@ public string AliasName { get; set; } Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1054,7 +1054,7 @@ public string EntityId { get; set; } ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1068,7 +1068,7 @@ public string EntityName { get; set; } Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1080,7 +1080,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- diff --git a/docs/dataVaultIdentityEntity.go.md b/docs/dataVaultIdentityEntity.go.md index e798877d..82a58cba 100644 --- a/docs/dataVaultIdentityEntity.go.md +++ b/docs/dataVaultIdentityEntity.go.md @@ -4,12 +4,12 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityentity" datavaultidentityentity.NewDataVaultIdentityEntity(scope Construct, id *string, config DataVaultIdentityEntityConfig) DataVaultIdentityEntity ``` @@ -325,7 +325,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityentity" datavaultidentityentity.DataVaultIdentityEntity_IsConstruct(x interface{}) *bool ``` @@ -357,7 +357,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityentity" datavaultidentityentity.DataVaultIdentityEntity_IsTerraformElement(x interface{}) *bool ``` @@ -371,7 +371,7 @@ datavaultidentityentity.DataVaultIdentityEntity_IsTerraformElement(x interface{} ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityentity" datavaultidentityentity.DataVaultIdentityEntity_IsTerraformDataSource(x interface{}) *bool ``` @@ -385,7 +385,7 @@ datavaultidentityentity.DataVaultIdentityEntity_IsTerraformDataSource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityentity" datavaultidentityentity.DataVaultIdentityEntity_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -878,7 +878,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityentity" &datavaultidentityentity.DataVaultIdentityEntityAliases { @@ -891,7 +891,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityenti #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityentity" &datavaultidentityentity.DataVaultIdentityEntityConfig { Connection: interface{}, @@ -927,7 +927,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityenti | AliasName | *string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | EntityId | *string | ID of the entity. | | EntityName | *string | Name of the entity. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -1012,7 +1012,7 @@ AliasId *string ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1026,7 +1026,7 @@ AliasMountAccessor *string Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1040,7 +1040,7 @@ AliasName *string Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1054,7 +1054,7 @@ EntityId *string ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1068,7 +1068,7 @@ EntityName *string Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1080,7 +1080,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- @@ -1108,7 +1108,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityentity" datavaultidentityentity.NewDataVaultIdentityEntityAliasesList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DataVaultIdentityEntityAliasesList ``` @@ -1257,7 +1257,7 @@ func Fqn() *string #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityentity" datavaultidentityentity.NewDataVaultIdentityEntityAliasesOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DataVaultIdentityEntityAliasesOutputReference ``` diff --git a/docs/dataVaultIdentityEntity.java.md b/docs/dataVaultIdentityEntity.java.md index 00626105..ea6317cb 100644 --- a/docs/dataVaultIdentityEntity.java.md +++ b/docs/dataVaultIdentityEntity.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers @@ -49,7 +49,7 @@ DataVaultIdentityEntity.Builder.create(Construct scope, java.lang.String id) | aliasName | java.lang.String | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entityId | java.lang.String | ID of the entity. | | entityName | java.lang.String | Name of the entity. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- @@ -553,7 +553,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -1069,7 +1069,7 @@ DataVaultIdentityEntityConfig.builder() | aliasName | java.lang.String | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entityId | java.lang.String | ID of the entity. | | entityName | java.lang.String | Name of the entity. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1154,7 +1154,7 @@ public java.lang.String getAliasId(); ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1168,7 +1168,7 @@ public java.lang.String getAliasMountAccessor(); Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1182,7 +1182,7 @@ public java.lang.String getAliasName(); Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1196,7 +1196,7 @@ public java.lang.String getEntityId(); ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1210,7 +1210,7 @@ public java.lang.String getEntityName(); Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1222,7 +1222,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1239,7 +1239,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- diff --git a/docs/dataVaultIdentityEntity.python.md b/docs/dataVaultIdentityEntity.python.md index dd23e556..10eb07ea 100644 --- a/docs/dataVaultIdentityEntity.python.md +++ b/docs/dataVaultIdentityEntity.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers @@ -47,7 +47,7 @@ dataVaultIdentityEntity.DataVaultIdentityEntity( | alias_name | str | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entity_id | str | ID of the entity. | | entity_name | str | Name of the entity. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- @@ -587,7 +587,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -1098,7 +1098,7 @@ dataVaultIdentityEntity.DataVaultIdentityEntityConfig( | alias_name | str | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entity_id | str | ID of the entity. | | entity_name | str | Name of the entity. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1183,7 +1183,7 @@ alias_id: str ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1197,7 +1197,7 @@ alias_mount_accessor: str Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1211,7 +1211,7 @@ alias_name: str Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1225,7 +1225,7 @@ entity_id: str ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1239,7 +1239,7 @@ entity_name: str Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1251,7 +1251,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1268,7 +1268,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- diff --git a/docs/dataVaultIdentityEntity.typescript.md b/docs/dataVaultIdentityEntity.typescript.md index 61f15f32..65693d93 100644 --- a/docs/dataVaultIdentityEntity.typescript.md +++ b/docs/dataVaultIdentityEntity.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -910,7 +910,7 @@ const dataVaultIdentityEntityConfig: dataVaultIdentityEntity.DataVaultIdentityEn | aliasName | string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entityId | string | ID of the entity. | | entityName | string | Name of the entity. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -995,7 +995,7 @@ public readonly aliasId: string; ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1009,7 +1009,7 @@ public readonly aliasMountAccessor: string; Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1023,7 +1023,7 @@ public readonly aliasName: string; Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1037,7 +1037,7 @@ public readonly entityId: string; ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1051,7 +1051,7 @@ public readonly entityName: string; Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1063,7 +1063,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1080,7 +1080,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- diff --git a/docs/dataVaultIdentityGroup.csharp.md b/docs/dataVaultIdentityGroup.csharp.md index f8e9ca88..aa4fd06f 100644 --- a/docs/dataVaultIdentityGroup.csharp.md +++ b/docs/dataVaultIdentityGroup.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ new DataVaultIdentityGroupConfig { | AliasName | string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | GroupId | string | ID of the group. | | GroupName | string | Name of the group. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -1065,7 +1065,7 @@ public string AliasId { get; set; } ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1079,7 +1079,7 @@ public string AliasMountAccessor { get; set; } Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1093,7 +1093,7 @@ public string AliasName { get; set; } Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1107,7 +1107,7 @@ public string GroupId { get; set; } ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1121,7 +1121,7 @@ public string GroupName { get; set; } Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1133,7 +1133,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1150,7 +1150,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityGroup.go.md b/docs/dataVaultIdentityGroup.go.md index 404965e8..b98e3277 100644 --- a/docs/dataVaultIdentityGroup.go.md +++ b/docs/dataVaultIdentityGroup.go.md @@ -4,12 +4,12 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentitygroup" datavaultidentitygroup.NewDataVaultIdentityGroup(scope Construct, id *string, config DataVaultIdentityGroupConfig) DataVaultIdentityGroup ``` @@ -325,7 +325,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentitygroup" datavaultidentitygroup.DataVaultIdentityGroup_IsConstruct(x interface{}) *bool ``` @@ -357,7 +357,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentitygroup" datavaultidentitygroup.DataVaultIdentityGroup_IsTerraformElement(x interface{}) *bool ``` @@ -371,7 +371,7 @@ datavaultidentitygroup.DataVaultIdentityGroup_IsTerraformElement(x interface{}) ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentitygroup" datavaultidentitygroup.DataVaultIdentityGroup_IsTerraformDataSource(x interface{}) *bool ``` @@ -385,7 +385,7 @@ datavaultidentitygroup.DataVaultIdentityGroup_IsTerraformDataSource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentitygroup" datavaultidentitygroup.DataVaultIdentityGroup_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -944,7 +944,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentitygroup" &datavaultidentitygroup.DataVaultIdentityGroupConfig { Connection: interface{}, @@ -980,7 +980,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentitygrou | AliasName | *string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | GroupId | *string | ID of the group. | | GroupName | *string | Name of the group. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -1065,7 +1065,7 @@ AliasId *string ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1079,7 +1079,7 @@ AliasMountAccessor *string Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1093,7 +1093,7 @@ AliasName *string Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1107,7 +1107,7 @@ GroupId *string ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1121,7 +1121,7 @@ GroupName *string Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1133,7 +1133,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1150,7 +1150,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityGroup.java.md b/docs/dataVaultIdentityGroup.java.md index 5bbba98d..d049f73f 100644 --- a/docs/dataVaultIdentityGroup.java.md +++ b/docs/dataVaultIdentityGroup.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers @@ -49,7 +49,7 @@ DataVaultIdentityGroup.Builder.create(Construct scope, java.lang.String id) | aliasName | java.lang.String | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | groupId | java.lang.String | ID of the group. | | groupName | java.lang.String | Name of the group. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- @@ -553,7 +553,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1123,7 +1123,7 @@ DataVaultIdentityGroupConfig.builder() | aliasName | java.lang.String | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | groupId | java.lang.String | ID of the group. | | groupName | java.lang.String | Name of the group. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1208,7 +1208,7 @@ public java.lang.String getAliasId(); ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1222,7 +1222,7 @@ public java.lang.String getAliasMountAccessor(); Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1236,7 +1236,7 @@ public java.lang.String getAliasName(); Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1250,7 +1250,7 @@ public java.lang.String getGroupId(); ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1264,7 +1264,7 @@ public java.lang.String getGroupName(); Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1276,7 +1276,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1293,7 +1293,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityGroup.python.md b/docs/dataVaultIdentityGroup.python.md index 9b027c0b..d0a8db8c 100644 --- a/docs/dataVaultIdentityGroup.python.md +++ b/docs/dataVaultIdentityGroup.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers @@ -47,7 +47,7 @@ dataVaultIdentityGroup.DataVaultIdentityGroup( | alias_name | str | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | group_id | str | ID of the group. | | group_name | str | Name of the group. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- @@ -587,7 +587,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1153,7 +1153,7 @@ dataVaultIdentityGroup.DataVaultIdentityGroupConfig( | alias_name | str | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | group_id | str | ID of the group. | | group_name | str | Name of the group. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1238,7 +1238,7 @@ alias_id: str ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1252,7 +1252,7 @@ alias_mount_accessor: str Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1266,7 +1266,7 @@ alias_name: str Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1280,7 +1280,7 @@ group_id: str ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1294,7 +1294,7 @@ group_name: str Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1306,7 +1306,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1323,7 +1323,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityGroup.typescript.md b/docs/dataVaultIdentityGroup.typescript.md index 4309096f..a776ec2e 100644 --- a/docs/dataVaultIdentityGroup.typescript.md +++ b/docs/dataVaultIdentityGroup.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -965,7 +965,7 @@ const dataVaultIdentityGroupConfig: dataVaultIdentityGroup.DataVaultIdentityGrou | aliasName | string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | groupId | string | ID of the group. | | groupName | string | Name of the group. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -1050,7 +1050,7 @@ public readonly aliasId: string; ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1064,7 +1064,7 @@ public readonly aliasMountAccessor: string; Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1078,7 +1078,7 @@ public readonly aliasName: string; Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1092,7 +1092,7 @@ public readonly groupId: string; ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1106,7 +1106,7 @@ public readonly groupName: string; Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1118,7 +1118,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1135,7 +1135,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.csharp.md b/docs/dataVaultIdentityOidcClientCreds.csharp.md index 46063175..7a5f8c5f 100644 --- a/docs/dataVaultIdentityOidcClientCreds.csharp.md +++ b/docs/dataVaultIdentityOidcClientCreds.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -673,7 +673,7 @@ new DataVaultIdentityOidcClientCredsConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Name | string | The name of the client. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -758,7 +758,7 @@ public string Name { get; set; } The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -770,7 +770,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -787,7 +787,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.go.md b/docs/dataVaultIdentityOidcClientCreds.go.md index d2a1702f..7836011d 100644 --- a/docs/dataVaultIdentityOidcClientCreds.go.md +++ b/docs/dataVaultIdentityOidcClientCreds.go.md @@ -4,12 +4,12 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.NewDataVaultIdentityOidcClientCreds(scope Construct, id *string, config DataVaultIdentityOidcClientCredsConfig) DataVaultIdentityOidcClientCreds ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsTerraformEle ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_IsTerraformDat ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcclientcreds" datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCreds_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -645,7 +645,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcclientcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcclientcreds" &datavaultidentityoidcclientcreds.DataVaultIdentityOidcClientCredsConfig { Connection: interface{}, @@ -673,7 +673,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidc | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the client. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -758,7 +758,7 @@ Name *string The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -770,7 +770,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -787,7 +787,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.java.md b/docs/dataVaultIdentityOidcClientCreds.java.md index bdb0abb9..ba247b6c 100644 --- a/docs/dataVaultIdentityOidcClientCreds.java.md +++ b/docs/dataVaultIdentityOidcClientCreds.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers @@ -41,7 +41,7 @@ DataVaultIdentityOidcClientCreds.Builder.create(Construct scope, java.lang.Strin | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the client. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -768,7 +768,7 @@ DataVaultIdentityOidcClientCredsConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the client. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -853,7 +853,7 @@ public java.lang.String getName(); The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -865,7 +865,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -882,7 +882,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.python.md b/docs/dataVaultIdentityOidcClientCreds.python.md index d4d5a7e0..e7b23e23 100644 --- a/docs/dataVaultIdentityOidcClientCreds.python.md +++ b/docs/dataVaultIdentityOidcClientCreds.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers @@ -39,7 +39,7 @@ dataVaultIdentityOidcClientCreds.DataVaultIdentityOidcClientCreds( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the client. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -798,7 +798,7 @@ dataVaultIdentityOidcClientCreds.DataVaultIdentityOidcClientCredsConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the client. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -883,7 +883,7 @@ name: str The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -895,7 +895,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -912,7 +912,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.typescript.md b/docs/dataVaultIdentityOidcClientCreds.typescript.md index 31fc16e5..fed7d4c7 100644 --- a/docs/dataVaultIdentityOidcClientCreds.typescript.md +++ b/docs/dataVaultIdentityOidcClientCreds.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -662,7 +662,7 @@ const dataVaultIdentityOidcClientCredsConfig: dataVaultIdentityOidcClientCreds.D | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the client. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ public readonly name: string; The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -759,7 +759,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.csharp.md b/docs/dataVaultIdentityOidcOpenidConfig.csharp.md index fcd575fd..b5040a06 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.csharp.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -783,7 +783,7 @@ new DataVaultIdentityOidcOpenidConfigConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Name | string | The name of the provider. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -868,7 +868,7 @@ public string Name { get; set; } The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -880,7 +880,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -897,7 +897,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.go.md b/docs/dataVaultIdentityOidcOpenidConfig.go.md index 8668345e..95880722 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.go.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.go.md @@ -4,12 +4,12 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.NewDataVaultIdentityOidcOpenidConfig(scope Construct, id *string, config DataVaultIdentityOidcOpenidConfigConfig) DataVaultIdentityOidcOpenidConfig ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsTerraformE ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_IsTerraformD ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcopenidconfig" datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -755,7 +755,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcopenidconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcopenidconfig" &datavaultidentityoidcopenidconfig.DataVaultIdentityOidcOpenidConfigConfig { Connection: interface{}, @@ -783,7 +783,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidc | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the provider. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -868,7 +868,7 @@ Name *string The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -880,7 +880,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -897,7 +897,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.java.md b/docs/dataVaultIdentityOidcOpenidConfig.java.md index e988232f..450e8a4e 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.java.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers @@ -41,7 +41,7 @@ DataVaultIdentityOidcOpenidConfig.Builder.create(Construct scope, java.lang.Stri | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the provider. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -878,7 +878,7 @@ DataVaultIdentityOidcOpenidConfigConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the provider. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -963,7 +963,7 @@ public java.lang.String getName(); The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -975,7 +975,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -992,7 +992,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.python.md b/docs/dataVaultIdentityOidcOpenidConfig.python.md index dd630149..18aabd00 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.python.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers @@ -39,7 +39,7 @@ dataVaultIdentityOidcOpenidConfig.DataVaultIdentityOidcOpenidConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the provider. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ dataVaultIdentityOidcOpenidConfig.DataVaultIdentityOidcOpenidConfigConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the provider. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ name: str The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -1005,7 +1005,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1022,7 +1022,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.typescript.md b/docs/dataVaultIdentityOidcOpenidConfig.typescript.md index 1f066216..c41ad433 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.typescript.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -772,7 +772,7 @@ const dataVaultIdentityOidcOpenidConfigConfig: dataVaultIdentityOidcOpenidConfig | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the provider. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -857,7 +857,7 @@ public readonly name: string; The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -869,7 +869,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -886,7 +886,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.csharp.md b/docs/dataVaultIdentityOidcPublicKeys.csharp.md index 853bb2cf..f2d3a70b 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.csharp.md +++ b/docs/dataVaultIdentityOidcPublicKeys.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -662,7 +662,7 @@ new DataVaultIdentityOidcPublicKeysConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Name | string | The name of the provider. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ public string Name { get; set; } The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -759,7 +759,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.go.md b/docs/dataVaultIdentityOidcPublicKeys.go.md index bf08341e..262a6d99 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.go.md +++ b/docs/dataVaultIdentityOidcPublicKeys.go.md @@ -4,12 +4,12 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.NewDataVaultIdentityOidcPublicKeys(scope Construct, id *string, config DataVaultIdentityOidcPublicKeysConfig) DataVaultIdentityOidcPublicKeys ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsTerraformEleme ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_IsTerraformDataS ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcpublickeys" datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeys_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -634,7 +634,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidcpublickeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidcpublickeys" &datavaultidentityoidcpublickeys.DataVaultIdentityOidcPublicKeysConfig { Connection: interface{}, @@ -662,7 +662,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultidentityoidc | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the provider. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ Name *string The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -759,7 +759,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.java.md b/docs/dataVaultIdentityOidcPublicKeys.java.md index e0e18929..a4c1309f 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.java.md +++ b/docs/dataVaultIdentityOidcPublicKeys.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers @@ -41,7 +41,7 @@ DataVaultIdentityOidcPublicKeys.Builder.create(Construct scope, java.lang.String | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the provider. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -757,7 +757,7 @@ DataVaultIdentityOidcPublicKeysConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the provider. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -842,7 +842,7 @@ public java.lang.String getName(); The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -854,7 +854,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -871,7 +871,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.python.md b/docs/dataVaultIdentityOidcPublicKeys.python.md index b0a9f26f..504bda4f 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.python.md +++ b/docs/dataVaultIdentityOidcPublicKeys.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers @@ -39,7 +39,7 @@ dataVaultIdentityOidcPublicKeys.DataVaultIdentityOidcPublicKeys( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the provider. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ dataVaultIdentityOidcPublicKeys.DataVaultIdentityOidcPublicKeysConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the provider. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ name: str The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -884,7 +884,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -901,7 +901,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.typescript.md b/docs/dataVaultIdentityOidcPublicKeys.typescript.md index b1c3a1e5..939dae9a 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.typescript.md +++ b/docs/dataVaultIdentityOidcPublicKeys.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -651,7 +651,7 @@ const dataVaultIdentityOidcPublicKeysConfig: dataVaultIdentityOidcPublicKeys.Dat | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the provider. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -736,7 +736,7 @@ public readonly name: string; The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -748,7 +748,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -765,7 +765,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.csharp.md b/docs/dataVaultKubernetesAuthBackendConfig.csharp.md index bb994ed4..65092d69 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.csharp.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -840,7 +840,7 @@ new DataVaultKubernetesAuthBackendConfigConfig { | Backend | string | Unique name of the kubernetes backend to configure. | | DisableIssValidation | object | Optional disable JWT issuer validation. Allows to skip ISS validation. | | DisableLocalCaJwt | object | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | Issuer | string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | KubernetesCaCert | string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | KubernetesHost | string | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | @@ -929,7 +929,7 @@ public string Backend { get; set; } Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -943,7 +943,7 @@ public object DisableIssValidation { get; set; } Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -957,7 +957,7 @@ public object DisableLocalCaJwt { get; set; } Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -969,7 +969,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -986,7 +986,7 @@ public string Issuer { get; set; } Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -1000,7 +1000,7 @@ public string KubernetesCaCert { get; set; } PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1014,7 +1014,7 @@ public string KubernetesHost { get; set; } Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1028,7 +1028,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1044,7 +1044,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.go.md b/docs/dataVaultKubernetesAuthBackendConfig.go.md index 847f310c..5c6ffd36 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.go.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.go.md @@ -4,12 +4,12 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.NewDataVaultKubernetesAuthBackendConfig(scope Construct, id *string, config DataVaultKubernetesAuthBackendConfigConfig) DataVaultKubernetesAuthBackendConfig ``` @@ -339,7 +339,7 @@ func ResetPemKeys() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsConstruct(x interface{}) *bool ``` @@ -371,7 +371,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsTerraformElement(x interface{}) *bool ``` @@ -385,7 +385,7 @@ datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsTerr ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsTerraformDataSource(x interface{}) *bool ``` @@ -399,7 +399,7 @@ datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_IsTerr ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendconfig" datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -804,7 +804,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendconfig" &datavaultkubernetesauthbackendconfig.DataVaultKubernetesAuthBackendConfigConfig { Connection: interface{}, @@ -840,7 +840,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesau | Backend | *string | Unique name of the kubernetes backend to configure. | | DisableIssValidation | interface{} | Optional disable JWT issuer validation. Allows to skip ISS validation. | | DisableLocalCaJwt | interface{} | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | Issuer | *string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | KubernetesCaCert | *string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | KubernetesHost | *string | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | @@ -929,7 +929,7 @@ Backend *string Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -943,7 +943,7 @@ DisableIssValidation interface{} Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -957,7 +957,7 @@ DisableLocalCaJwt interface{} Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -969,7 +969,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -986,7 +986,7 @@ Issuer *string Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -1000,7 +1000,7 @@ KubernetesCaCert *string PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1014,7 +1014,7 @@ KubernetesHost *string Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1028,7 +1028,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1044,7 +1044,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.java.md b/docs/dataVaultKubernetesAuthBackendConfig.java.md index f2f54a7c..56337e67 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.java.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.java.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -51,7 +51,7 @@ DataVaultKubernetesAuthBackendConfig.Builder.create(Construct scope, java.lang.S | backend | java.lang.String | Unique name of the kubernetes backend to configure. | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | java.lang.String | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | java.lang.String | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetesHost | java.lang.String | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -209,7 +209,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} --- @@ -595,7 +595,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -1013,7 +1013,7 @@ DataVaultKubernetesAuthBackendConfigConfig.builder() | backend | java.lang.String | Unique name of the kubernetes backend to configure. | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | java.lang.String | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | java.lang.String | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetesHost | java.lang.String | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | @@ -1102,7 +1102,7 @@ public java.lang.String getBackend(); Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -1116,7 +1116,7 @@ public java.lang.Object getDisableIssValidation(); Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1130,7 +1130,7 @@ public java.lang.Object getDisableLocalCaJwt(); Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1142,7 +1142,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1159,7 +1159,7 @@ public java.lang.String getIssuer(); Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -1173,7 +1173,7 @@ public java.lang.String getKubernetesCaCert(); PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1187,7 +1187,7 @@ public java.lang.String getKubernetesHost(); Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1201,7 +1201,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1217,7 +1217,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.python.md b/docs/dataVaultKubernetesAuthBackendConfig.python.md index f7d85ca0..cfd7a4b9 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.python.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.python.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -47,7 +47,7 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfig( | backend | str | Unique name of the kubernetes backend to configure. | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | str | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetes_ca_cert | str | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetes_host | str | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ If you experience problems setting this value it might not be settable. Please t Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -205,7 +205,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} --- @@ -627,7 +627,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -1039,7 +1039,7 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfigConfig( | backend | str | Unique name of the kubernetes backend to configure. | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | str | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetes_ca_cert | str | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetes_host | str | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | @@ -1128,7 +1128,7 @@ backend: str Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -1142,7 +1142,7 @@ disable_iss_validation: typing.Union[bool, IResolvable] Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1156,7 +1156,7 @@ disable_local_ca_jwt: typing.Union[bool, IResolvable] Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1168,7 +1168,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1185,7 +1185,7 @@ issuer: str Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -1199,7 +1199,7 @@ kubernetes_ca_cert: str PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1213,7 +1213,7 @@ kubernetes_host: str Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1227,7 +1227,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1243,7 +1243,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.typescript.md b/docs/dataVaultKubernetesAuthBackendConfig.typescript.md index 97c59b3e..edafc356 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.typescript.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const dataVaultKubernetesAuthBackendConfigConfig: dataVaultKubernetesAuthBackend | backend | string | Unique name of the kubernetes backend to configure. | | disableIssValidation | boolean \| cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | boolean \| cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetesHost | string | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | @@ -912,7 +912,7 @@ public readonly backend: string; Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -926,7 +926,7 @@ public readonly disableIssValidation: boolean | IResolvable; Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -940,7 +940,7 @@ public readonly disableLocalCaJwt: boolean | IResolvable; Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -952,7 +952,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -969,7 +969,7 @@ public readonly issuer: string; Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -983,7 +983,7 @@ public readonly kubernetesCaCert: string; PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -997,7 +997,7 @@ public readonly kubernetesHost: string; Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1011,7 +1011,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1027,7 +1027,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.csharp.md b/docs/dataVaultKubernetesAuthBackendRole.csharp.md index 3acdbd65..8e5fb3cd 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.csharp.md +++ b/docs/dataVaultKubernetesAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -456,7 +456,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1016,7 +1016,7 @@ new DataVaultKubernetesAuthBackendRoleConfig { | RoleName | string | Name of the role. | | Audience | string | Optional Audience claim to verify in the JWT. | | Backend | string | Unique name of the kubernetes backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1110,7 +1110,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1124,7 +1124,7 @@ public string Audience { get; set; } Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1138,7 +1138,7 @@ public string Backend { get; set; } Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1150,7 +1150,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1167,7 +1167,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1181,7 +1181,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1195,7 +1195,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1209,7 +1209,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1223,7 +1223,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1237,7 +1237,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1251,7 +1251,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1265,7 +1265,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1279,7 +1279,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1293,7 +1293,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.go.md b/docs/dataVaultKubernetesAuthBackendRole.go.md index 13880250..93c46cad 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.go.md +++ b/docs/dataVaultKubernetesAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.NewDataVaultKubernetesAuthBackendRole(scope Construct, id *string, config DataVaultKubernetesAuthBackendRoleConfig) DataVaultKubernetesAuthBackendRole ``` @@ -367,7 +367,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -399,7 +399,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -413,7 +413,7 @@ datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsTerrafor ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsTerraformDataSource(x interface{}) *bool ``` @@ -427,7 +427,7 @@ datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_IsTerrafor ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendrole" datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -456,7 +456,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -975,7 +975,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesauthbackendrole" &datavaultkubernetesauthbackendrole.DataVaultKubernetesAuthBackendRoleConfig { Connection: interface{}, @@ -1016,7 +1016,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesau | RoleName | *string | Name of the role. | | Audience | *string | Optional Audience claim to verify in the JWT. | | Backend | *string | Unique name of the kubernetes backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1110,7 +1110,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1124,7 +1124,7 @@ Audience *string Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1138,7 +1138,7 @@ Backend *string Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1150,7 +1150,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1167,7 +1167,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1181,7 +1181,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1195,7 +1195,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1209,7 +1209,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1223,7 +1223,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1237,7 +1237,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1251,7 +1251,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1265,7 +1265,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1279,7 +1279,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1293,7 +1293,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.java.md b/docs/dataVaultKubernetesAuthBackendRole.java.md index fc43c0f4..c48e41ba 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.java.md +++ b/docs/dataVaultKubernetesAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -55,7 +55,7 @@ DataVaultKubernetesAuthBackendRole.Builder.create(Construct scope, java.lang.Str | roleName | java.lang.String | Name of the role. | | audience | java.lang.String | Optional Audience claim to verify in the JWT. | | backend | java.lang.String | Unique name of the kubernetes backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- @@ -680,7 +680,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1245,7 +1245,7 @@ DataVaultKubernetesAuthBackendRoleConfig.builder() | roleName | java.lang.String | Name of the role. | | audience | java.lang.String | Optional Audience claim to verify in the JWT. | | backend | java.lang.String | Unique name of the kubernetes backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1339,7 +1339,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1353,7 +1353,7 @@ public java.lang.String getAudience(); Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1367,7 +1367,7 @@ public java.lang.String getBackend(); Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1379,7 +1379,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1396,7 +1396,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1410,7 +1410,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1424,7 +1424,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1438,7 +1438,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1452,7 +1452,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1466,7 +1466,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1480,7 +1480,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1494,7 +1494,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1508,7 +1508,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1522,7 +1522,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.python.md b/docs/dataVaultKubernetesAuthBackendRole.python.md index 2f7bd37f..aac699c1 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.python.md +++ b/docs/dataVaultKubernetesAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -52,7 +52,7 @@ dataVaultKubernetesAuthBackendRole.DataVaultKubernetesAuthBackendRole( | role_name | str | Name of the role. | | audience | str | Optional Audience claim to verify in the JWT. | | backend | str | Unique name of the kubernetes backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- @@ -713,7 +713,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1273,7 +1273,7 @@ dataVaultKubernetesAuthBackendRole.DataVaultKubernetesAuthBackendRoleConfig( | role_name | str | Name of the role. | | audience | str | Optional Audience claim to verify in the JWT. | | backend | str | Unique name of the kubernetes backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1367,7 +1367,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1381,7 +1381,7 @@ audience: str Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1395,7 +1395,7 @@ backend: str Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1407,7 +1407,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1424,7 +1424,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1438,7 +1438,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1452,7 +1452,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1466,7 +1466,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1480,7 +1480,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1494,7 +1494,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1508,7 +1508,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1522,7 +1522,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1536,7 +1536,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1550,7 +1550,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.typescript.md b/docs/dataVaultKubernetesAuthBackendRole.typescript.md index 3dccf8df..cebd3aea 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.typescript.md +++ b/docs/dataVaultKubernetesAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -456,7 +456,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -994,7 +994,7 @@ const dataVaultKubernetesAuthBackendRoleConfig: dataVaultKubernetesAuthBackendRo | roleName | string | Name of the role. | | audience | string | Optional Audience claim to verify in the JWT. | | backend | string | Unique name of the kubernetes backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1088,7 +1088,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1102,7 +1102,7 @@ public readonly audience: string; Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1116,7 +1116,7 @@ public readonly backend: string; Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1128,7 +1128,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1145,7 +1145,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1159,7 +1159,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1173,7 +1173,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1187,7 +1187,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1201,7 +1201,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1215,7 +1215,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1229,7 +1229,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1243,7 +1243,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1257,7 +1257,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1271,7 +1271,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.csharp.md b/docs/dataVaultKubernetesServiceAccountToken.csharp.md index 0b59f381..5cdc7766 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.csharp.md +++ b/docs/dataVaultKubernetesServiceAccountToken.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -826,7 +826,7 @@ new DataVaultKubernetesServiceAccountTokenConfig { | KubernetesNamespace | string | The name of the Kubernetes namespace in which to generate the credentials. | | Role | string | The name of the role. | | ClusterRoleBinding | object | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Ttl | string | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -912,7 +912,7 @@ public string Backend { get; set; } The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -926,7 +926,7 @@ public string KubernetesNamespace { get; set; } The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -940,7 +940,7 @@ public string Role { get; set; } The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -954,7 +954,7 @@ public object ClusterRoleBinding { get; set; } If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -966,7 +966,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -997,7 +997,7 @@ public string Ttl { get; set; } The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.go.md b/docs/dataVaultKubernetesServiceAccountToken.go.md index d3065ba4..55c8afd1 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.go.md +++ b/docs/dataVaultKubernetesServiceAccountToken.go.md @@ -4,12 +4,12 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.NewDataVaultKubernetesServiceAccountToken(scope Construct, id *string, config DataVaultKubernetesServiceAccountTokenConfig) DataVaultKubernetesServiceAccountToken ``` @@ -304,7 +304,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_IsConstruct(x interface{}) *bool ``` @@ -336,7 +336,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_IsTerraformElement(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_Is ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_IsTerraformDataSource(x interface{}) *bool ``` @@ -364,7 +364,7 @@ datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_Is ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesserviceaccounttoken" datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountToken_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -791,7 +791,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesserviceaccounttoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesserviceaccounttoken" &datavaultkubernetesserviceaccounttoken.DataVaultKubernetesServiceAccountTokenConfig { Connection: interface{}, @@ -826,7 +826,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkubernetesse | KubernetesNamespace | *string | The name of the Kubernetes namespace in which to generate the credentials. | | Role | *string | The name of the role. | | ClusterRoleBinding | interface{} | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Ttl | *string | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -912,7 +912,7 @@ Backend *string The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -926,7 +926,7 @@ KubernetesNamespace *string The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -940,7 +940,7 @@ Role *string The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -954,7 +954,7 @@ ClusterRoleBinding interface{} If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -966,7 +966,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -997,7 +997,7 @@ Ttl *string The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.java.md b/docs/dataVaultKubernetesServiceAccountToken.java.md index 4f7001fc..7c2a0633 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.java.md +++ b/docs/dataVaultKubernetesServiceAccountToken.java.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers @@ -49,7 +49,7 @@ DataVaultKubernetesServiceAccountToken.Builder.create(Construct scope, java.lang | kubernetesNamespace | java.lang.String | The name of the Kubernetes namespace in which to generate the credentials. | | role | java.lang.String | The name of the role. | | clusterRoleBinding | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.String | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -172,7 +172,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- @@ -533,7 +533,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -971,7 +971,7 @@ DataVaultKubernetesServiceAccountTokenConfig.builder() | kubernetesNamespace | java.lang.String | The name of the Kubernetes namespace in which to generate the credentials. | | role | java.lang.String | The name of the role. | | clusterRoleBinding | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.String | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -1057,7 +1057,7 @@ public java.lang.String getBackend(); The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -1071,7 +1071,7 @@ public java.lang.String getKubernetesNamespace(); The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -1085,7 +1085,7 @@ public java.lang.String getRole(); The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -1099,7 +1099,7 @@ public java.lang.Object getClusterRoleBinding(); If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -1111,7 +1111,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1128,7 +1128,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -1142,7 +1142,7 @@ public java.lang.String getTtl(); The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.python.md b/docs/dataVaultKubernetesServiceAccountToken.python.md index caa15f9d..0b630657 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.python.md +++ b/docs/dataVaultKubernetesServiceAccountToken.python.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers @@ -46,7 +46,7 @@ dataVaultKubernetesServiceAccountToken.DataVaultKubernetesServiceAccountToken( | kubernetes_namespace | str | The name of the Kubernetes namespace in which to generate the credentials. | | role | str | The name of the role. | | cluster_role_binding | typing.Union[bool, cdktf.IResolvable] | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | str | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- @@ -566,7 +566,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -999,7 +999,7 @@ dataVaultKubernetesServiceAccountToken.DataVaultKubernetesServiceAccountTokenCon | kubernetes_namespace | str | The name of the Kubernetes namespace in which to generate the credentials. | | role | str | The name of the role. | | cluster_role_binding | typing.Union[bool, cdktf.IResolvable] | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | str | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -1085,7 +1085,7 @@ backend: str The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -1099,7 +1099,7 @@ kubernetes_namespace: str The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -1113,7 +1113,7 @@ role: str The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -1127,7 +1127,7 @@ cluster_role_binding: typing.Union[bool, IResolvable] If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -1139,7 +1139,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1156,7 +1156,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -1170,7 +1170,7 @@ ttl: str The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.typescript.md b/docs/dataVaultKubernetesServiceAccountToken.typescript.md index 407b8e84..b7f3485a 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.typescript.md +++ b/docs/dataVaultKubernetesServiceAccountToken.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -811,7 +811,7 @@ const dataVaultKubernetesServiceAccountTokenConfig: dataVaultKubernetesServiceAc | kubernetesNamespace | string | The name of the Kubernetes namespace in which to generate the credentials. | | role | string | The name of the role. | | clusterRoleBinding | boolean \| cdktf.IResolvable | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | string | Target namespace. (requires Enterprise). | | ttl | string | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -897,7 +897,7 @@ public readonly backend: string; The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -911,7 +911,7 @@ public readonly kubernetesNamespace: string; The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -925,7 +925,7 @@ public readonly role: string; The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -939,7 +939,7 @@ public readonly clusterRoleBinding: boolean | IResolvable; If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -951,7 +951,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -968,7 +968,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -982,7 +982,7 @@ public readonly ttl: string; The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKvSecret.csharp.md b/docs/dataVaultKvSecret.csharp.md index 5376b874..af18e00f 100644 --- a/docs/dataVaultKvSecret.csharp.md +++ b/docs/dataVaultKvSecret.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -706,7 +706,7 @@ new DataVaultKvSecretConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Path | string | Full path of the KV-V1 secret. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -791,7 +791,7 @@ public string Path { get; set; } Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -803,7 +803,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -820,7 +820,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecret.go.md b/docs/dataVaultKvSecret.go.md index 1b349243..9da10441 100644 --- a/docs/dataVaultKvSecret.go.md +++ b/docs/dataVaultKvSecret.go.md @@ -4,12 +4,12 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecret" datavaultkvsecret.NewDataVaultKvSecret(scope Construct, id *string, config DataVaultKvSecretConfig) DataVaultKvSecret ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecret" datavaultkvsecret.DataVaultKvSecret_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecret" datavaultkvsecret.DataVaultKvSecret_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultkvsecret.DataVaultKvSecret_IsTerraformElement(x interface{}) *bool ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecret" datavaultkvsecret.DataVaultKvSecret_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultkvsecret.DataVaultKvSecret_IsTerraformDataSource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecret" datavaultkvsecret.DataVaultKvSecret_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -678,7 +678,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecret" &datavaultkvsecret.DataVaultKvSecretConfig { Connection: interface{}, @@ -706,7 +706,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecret" | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Path | *string | Full path of the KV-V1 secret. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -791,7 +791,7 @@ Path *string Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -803,7 +803,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -820,7 +820,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecret.java.md b/docs/dataVaultKvSecret.java.md index c98e9a40..87fbf685 100644 --- a/docs/dataVaultKvSecret.java.md +++ b/docs/dataVaultKvSecret.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers @@ -41,7 +41,7 @@ DataVaultKvSecret.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full path of the KV-V1 secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -801,7 +801,7 @@ DataVaultKvSecretConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full path of the KV-V1 secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -886,7 +886,7 @@ public java.lang.String getPath(); Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -898,7 +898,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecret.python.md b/docs/dataVaultKvSecret.python.md index bbf01452..7c9bd349 100644 --- a/docs/dataVaultKvSecret.python.md +++ b/docs/dataVaultKvSecret.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers @@ -39,7 +39,7 @@ dataVaultKvSecret.DataVaultKvSecret( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full path of the KV-V1 secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -831,7 +831,7 @@ dataVaultKvSecret.DataVaultKvSecretConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full path of the KV-V1 secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -916,7 +916,7 @@ path: str Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -928,7 +928,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -945,7 +945,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecret.typescript.md b/docs/dataVaultKvSecret.typescript.md index 59f9eb44..3f4f89a1 100644 --- a/docs/dataVaultKvSecret.typescript.md +++ b/docs/dataVaultKvSecret.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -695,7 +695,7 @@ const dataVaultKvSecretConfig: dataVaultKvSecret.DataVaultKvSecretConfig = { ... | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | Full path of the KV-V1 secret. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -780,7 +780,7 @@ public readonly path: string; Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -792,7 +792,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -809,7 +809,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.csharp.md b/docs/dataVaultKvSecretSubkeysV2.csharp.md index 87f51a47..85ca953a 100644 --- a/docs/dataVaultKvSecretSubkeysV2.csharp.md +++ b/docs/dataVaultKvSecretSubkeysV2.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ new DataVaultKvSecretSubkeysV2Config { | Mount | string | Path where KV-V2 engine is mounted. | | Name | string | Full name of the secret. | | Depth | double | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Version | double | Specifies the version to return. If not set the latest version is returned. | @@ -855,7 +855,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -871,7 +871,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -885,7 +885,7 @@ public double Depth { get; set; } Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -897,7 +897,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -914,7 +914,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -928,7 +928,7 @@ public double Version { get; set; } Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.go.md b/docs/dataVaultKvSecretSubkeysV2.go.md index b4b91c61..46002ba5 100644 --- a/docs/dataVaultKvSecretSubkeysV2.go.md +++ b/docs/dataVaultKvSecretSubkeysV2.go.md @@ -4,12 +4,12 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.NewDataVaultKvSecretSubkeysV2(scope Construct, id *string, config DataVaultKvSecretSubkeysV2Config) DataVaultKvSecretSubkeysV2 ``` @@ -304,7 +304,7 @@ func ResetVersion() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsConstruct(x interface{}) *bool ``` @@ -336,7 +336,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsTerraformElement(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsTerraformElement(x inter ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsTerraformDataSource(x interface{}) *bool ``` @@ -364,7 +364,7 @@ datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_IsTerraformDataSource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretsubkeysv2" datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -736,7 +736,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubkeysv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretsubkeysv2" &datavaultkvsecretsubkeysv2.DataVaultKvSecretSubkeysV2Config { Connection: interface{}, @@ -769,7 +769,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretsubk | Mount | *string | Path where KV-V2 engine is mounted. | | Name | *string | Full name of the secret. | | Depth | *f64 | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Version | *f64 | Specifies the version to return. If not set the latest version is returned. | @@ -855,7 +855,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -871,7 +871,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -885,7 +885,7 @@ Depth *f64 Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -897,7 +897,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -914,7 +914,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -928,7 +928,7 @@ Version *f64 Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.java.md b/docs/dataVaultKvSecretSubkeysV2.java.md index 84a28bc9..05e4cfa8 100644 --- a/docs/dataVaultKvSecretSubkeysV2.java.md +++ b/docs/dataVaultKvSecretSubkeysV2.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers @@ -46,7 +46,7 @@ DataVaultKvSecretSubkeysV2.Builder.create(Construct scope, java.lang.String id) | mount | java.lang.String | Path where KV-V2 engine is mounted. | | name | java.lang.String | Full name of the secret. | | depth | java.lang.Number | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | version | java.lang.Number | Specifies the version to return. If not set the latest version is returned. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -130,7 +130,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- @@ -522,7 +522,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -902,7 +902,7 @@ DataVaultKvSecretSubkeysV2Config.builder() | mount | java.lang.String | Path where KV-V2 engine is mounted. | | name | java.lang.String | Full name of the secret. | | depth | java.lang.Number | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | version | java.lang.Number | Specifies the version to return. If not set the latest version is returned. | @@ -988,7 +988,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -1004,7 +1004,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -1018,7 +1018,7 @@ public java.lang.Number getDepth(); Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -1030,7 +1030,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1047,7 +1047,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -1061,7 +1061,7 @@ public java.lang.Number getVersion(); Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.python.md b/docs/dataVaultKvSecretSubkeysV2.python.md index a3600962..1ed869b7 100644 --- a/docs/dataVaultKvSecretSubkeysV2.python.md +++ b/docs/dataVaultKvSecretSubkeysV2.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers @@ -44,7 +44,7 @@ dataVaultKvSecretSubkeysV2.DataVaultKvSecretSubkeysV2( | mount | str | Path where KV-V2 engine is mounted. | | name | str | Full name of the secret. | | depth | typing.Union[int, float] | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | version | typing.Union[int, float] | Specifies the version to return. If not set the latest version is returned. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -128,7 +128,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- @@ -556,7 +556,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -932,7 +932,7 @@ dataVaultKvSecretSubkeysV2.DataVaultKvSecretSubkeysV2Config( | mount | str | Path where KV-V2 engine is mounted. | | name | str | Full name of the secret. | | depth | typing.Union[int, float] | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | version | typing.Union[int, float] | Specifies the version to return. If not set the latest version is returned. | @@ -1018,7 +1018,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -1034,7 +1034,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -1048,7 +1048,7 @@ depth: typing.Union[int, float] Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -1060,7 +1060,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1077,7 +1077,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -1091,7 +1091,7 @@ version: typing.Union[int, float] Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.typescript.md b/docs/dataVaultKvSecretSubkeysV2.typescript.md index ff5213c5..c261437d 100644 --- a/docs/dataVaultKvSecretSubkeysV2.typescript.md +++ b/docs/dataVaultKvSecretSubkeysV2.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -755,7 +755,7 @@ const dataVaultKvSecretSubkeysV2Config: dataVaultKvSecretSubkeysV2.DataVaultKvSe | mount | string | Path where KV-V2 engine is mounted. | | name | string | Full name of the secret. | | depth | number | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | string | Target namespace. (requires Enterprise). | | version | number | Specifies the version to return. If not set the latest version is returned. | @@ -841,7 +841,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -857,7 +857,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -871,7 +871,7 @@ public readonly depth: number; Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -883,7 +883,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -900,7 +900,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -914,7 +914,7 @@ public readonly version: number; Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretV2.csharp.md b/docs/dataVaultKvSecretV2.csharp.md index 491bafbc..0d0b36d3 100644 --- a/docs/dataVaultKvSecretV2.csharp.md +++ b/docs/dataVaultKvSecretV2.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -782,7 +782,7 @@ new DataVaultKvSecretV2Config { | Provisioners | object[] | *No description.* | | Mount | string | Path where KV-V2 engine is mounted. | | Name | string | Full name of the secret. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Version | double | Version of the secret to retrieve. | @@ -868,7 +868,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -884,7 +884,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -896,7 +896,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -913,7 +913,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -927,7 +927,7 @@ public double Version { get; set; } Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretV2.go.md b/docs/dataVaultKvSecretV2.go.md index d34cee15..84d894ed 100644 --- a/docs/dataVaultKvSecretV2.go.md +++ b/docs/dataVaultKvSecretV2.go.md @@ -4,12 +4,12 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretv2" datavaultkvsecretv2.NewDataVaultKvSecretV2(scope Construct, id *string, config DataVaultKvSecretV2Config) DataVaultKvSecretV2 ``` @@ -297,7 +297,7 @@ func ResetVersion() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretv2" datavaultkvsecretv2.DataVaultKvSecretV2_IsConstruct(x interface{}) *bool ``` @@ -329,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretv2" datavaultkvsecretv2.DataVaultKvSecretV2_IsTerraformElement(x interface{}) *bool ``` @@ -343,7 +343,7 @@ datavaultkvsecretv2.DataVaultKvSecretV2_IsTerraformElement(x interface{}) *bool ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretv2" datavaultkvsecretv2.DataVaultKvSecretV2_IsTerraformDataSource(x interface{}) *bool ``` @@ -357,7 +357,7 @@ datavaultkvsecretv2.DataVaultKvSecretV2_IsTerraformDataSource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretv2" datavaultkvsecretv2.DataVaultKvSecretV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -751,7 +751,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretv2" &datavaultkvsecretv2.DataVaultKvSecretV2Config { Connection: interface{}, @@ -782,7 +782,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretv2" | Provisioners | *[]interface{} | *No description.* | | Mount | *string | Path where KV-V2 engine is mounted. | | Name | *string | Full name of the secret. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Version | *f64 | Version of the secret to retrieve. | @@ -868,7 +868,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -884,7 +884,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -896,7 +896,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -913,7 +913,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -927,7 +927,7 @@ Version *f64 Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretV2.java.md b/docs/dataVaultKvSecretV2.java.md index d3f2dcaa..502168fc 100644 --- a/docs/dataVaultKvSecretV2.java.md +++ b/docs/dataVaultKvSecretV2.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -44,7 +44,7 @@ DataVaultKvSecretV2.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | mount | java.lang.String | Path where KV-V2 engine is mounted. | | name | java.lang.String | Full name of the secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | version | java.lang.Number | Version of the secret to retrieve. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -128,7 +128,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -149,7 +149,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- @@ -503,7 +503,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -903,7 +903,7 @@ DataVaultKvSecretV2Config.builder() | provisioners | java.util.List | *No description.* | | mount | java.lang.String | Path where KV-V2 engine is mounted. | | name | java.lang.String | Full name of the secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | version | java.lang.Number | Version of the secret to retrieve. | @@ -989,7 +989,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -1005,7 +1005,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -1017,7 +1017,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -1048,7 +1048,7 @@ public java.lang.Number getVersion(); Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretV2.python.md b/docs/dataVaultKvSecretV2.python.md index a09be1df..ad44c082 100644 --- a/docs/dataVaultKvSecretV2.python.md +++ b/docs/dataVaultKvSecretV2.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -42,7 +42,7 @@ dataVaultKvSecretV2.DataVaultKvSecretV2( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | Path where KV-V2 engine is mounted. | | name | str | Full name of the secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | version | typing.Union[int, float] | Version of the secret to retrieve. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -126,7 +126,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- @@ -537,7 +537,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -933,7 +933,7 @@ dataVaultKvSecretV2.DataVaultKvSecretV2Config( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | Path where KV-V2 engine is mounted. | | name | str | Full name of the secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | version | typing.Union[int, float] | Version of the secret to retrieve. | @@ -1019,7 +1019,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -1035,7 +1035,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -1047,7 +1047,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1064,7 +1064,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -1078,7 +1078,7 @@ version: typing.Union[int, float] Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretV2.typescript.md b/docs/dataVaultKvSecretV2.typescript.md index 5d7ed274..742c51bc 100644 --- a/docs/dataVaultKvSecretV2.typescript.md +++ b/docs/dataVaultKvSecretV2.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ const dataVaultKvSecretV2Config: dataVaultKvSecretV2.DataVaultKvSecretV2Config = | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | mount | string | Path where KV-V2 engine is mounted. | | name | string | Full name of the secret. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | string | Target namespace. (requires Enterprise). | | version | number | Version of the secret to retrieve. | @@ -855,7 +855,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -871,7 +871,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -883,7 +883,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -900,7 +900,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -914,7 +914,7 @@ public readonly version: number; Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretsList.csharp.md b/docs/dataVaultKvSecretsList.csharp.md index d7601854..216133f5 100644 --- a/docs/dataVaultKvSecretsList.csharp.md +++ b/docs/dataVaultKvSecretsList.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -662,7 +662,7 @@ new DataVaultKvSecretsListConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Path | string | Full KV-V1 path where secrets will be listed. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ public string Path { get; set; } Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -759,7 +759,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsList.go.md b/docs/dataVaultKvSecretsList.go.md index 45c802a0..537fe810 100644 --- a/docs/dataVaultKvSecretsList.go.md +++ b/docs/dataVaultKvSecretsList.go.md @@ -4,12 +4,12 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslist" datavaultkvsecretslist.NewDataVaultKvSecretsList(scope Construct, id *string, config DataVaultKvSecretsListConfig) DataVaultKvSecretsList ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslist" datavaultkvsecretslist.DataVaultKvSecretsList_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslist" datavaultkvsecretslist.DataVaultKvSecretsList_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultkvsecretslist.DataVaultKvSecretsList_IsTerraformElement(x interface{}) ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslist" datavaultkvsecretslist.DataVaultKvSecretsList_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultkvsecretslist.DataVaultKvSecretsList_IsTerraformDataSource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslist" datavaultkvsecretslist.DataVaultKvSecretsList_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -634,7 +634,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslist" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslist" &datavaultkvsecretslist.DataVaultKvSecretsListConfig { Connection: interface{}, @@ -662,7 +662,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslis | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Path | *string | Full KV-V1 path where secrets will be listed. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ Path *string Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -759,7 +759,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsList.java.md b/docs/dataVaultKvSecretsList.java.md index e8f08f82..7dca5794 100644 --- a/docs/dataVaultKvSecretsList.java.md +++ b/docs/dataVaultKvSecretsList.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers @@ -41,7 +41,7 @@ DataVaultKvSecretsList.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full KV-V1 path where secrets will be listed. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -757,7 +757,7 @@ DataVaultKvSecretsListConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full KV-V1 path where secrets will be listed. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -842,7 +842,7 @@ public java.lang.String getPath(); Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -854,7 +854,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -871,7 +871,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsList.python.md b/docs/dataVaultKvSecretsList.python.md index 4369af40..7a4b01ce 100644 --- a/docs/dataVaultKvSecretsList.python.md +++ b/docs/dataVaultKvSecretsList.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers @@ -39,7 +39,7 @@ dataVaultKvSecretsList.DataVaultKvSecretsList( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full KV-V1 path where secrets will be listed. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ dataVaultKvSecretsList.DataVaultKvSecretsListConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full KV-V1 path where secrets will be listed. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ path: str Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -884,7 +884,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -901,7 +901,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsList.typescript.md b/docs/dataVaultKvSecretsList.typescript.md index ec596c50..1bb1e598 100644 --- a/docs/dataVaultKvSecretsList.typescript.md +++ b/docs/dataVaultKvSecretsList.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -651,7 +651,7 @@ const dataVaultKvSecretsListConfig: dataVaultKvSecretsList.DataVaultKvSecretsLis | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | Full KV-V1 path where secrets will be listed. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -736,7 +736,7 @@ public readonly path: string; Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -748,7 +748,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -765,7 +765,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.csharp.md b/docs/dataVaultKvSecretsListV2.csharp.md index d526eae5..18a769e2 100644 --- a/docs/dataVaultKvSecretsListV2.csharp.md +++ b/docs/dataVaultKvSecretsListV2.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -703,7 +703,7 @@ new DataVaultKvSecretsListV2Config { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Mount | string | Path where KV-V2 engine is mounted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | Name | string | Full named path of the secret. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -789,7 +789,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -801,7 +801,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -820,7 +820,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -834,7 +834,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.go.md b/docs/dataVaultKvSecretsListV2.go.md index 9b20c894..37975253 100644 --- a/docs/dataVaultKvSecretsListV2.go.md +++ b/docs/dataVaultKvSecretsListV2.go.md @@ -4,12 +4,12 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslistv2" datavaultkvsecretslistv2.NewDataVaultKvSecretsListV2(scope Construct, id *string, config DataVaultKvSecretsListV2Config) DataVaultKvSecretsListV2 ``` @@ -297,7 +297,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslistv2" datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsConstruct(x interface{}) *bool ``` @@ -329,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslistv2" datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsTerraformElement(x interface{}) *bool ``` @@ -343,7 +343,7 @@ datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsTerraformElement(x interface ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslistv2" datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsTerraformDataSource(x interface{}) *bool ``` @@ -357,7 +357,7 @@ datavaultkvsecretslistv2.DataVaultKvSecretsListV2_IsTerraformDataSource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslistv2" datavaultkvsecretslistv2.DataVaultKvSecretsListV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -674,7 +674,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslistv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslistv2" &datavaultkvsecretslistv2.DataVaultKvSecretsListV2Config { Connection: interface{}, @@ -703,7 +703,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultkvsecretslis | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Mount | *string | Path where KV-V2 engine is mounted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | Name | *string | Full named path of the secret. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -789,7 +789,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -801,7 +801,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -820,7 +820,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -834,7 +834,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.java.md b/docs/dataVaultKvSecretsListV2.java.md index 4b0a7f0d..250ffcfd 100644 --- a/docs/dataVaultKvSecretsListV2.java.md +++ b/docs/dataVaultKvSecretsListV2.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers @@ -42,7 +42,7 @@ DataVaultKvSecretsListV2.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | mount | java.lang.String | Path where KV-V2 engine is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | java.lang.String | Full named path of the secret. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -137,7 +137,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- @@ -491,7 +491,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -812,7 +812,7 @@ DataVaultKvSecretsListV2Config.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | mount | java.lang.String | Path where KV-V2 engine is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | java.lang.String | Full named path of the secret. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -898,7 +898,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -910,7 +910,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -929,7 +929,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -943,7 +943,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.python.md b/docs/dataVaultKvSecretsListV2.python.md index d38b9eff..92079e76 100644 --- a/docs/dataVaultKvSecretsListV2.python.md +++ b/docs/dataVaultKvSecretsListV2.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers @@ -40,7 +40,7 @@ dataVaultKvSecretsListV2.DataVaultKvSecretsListV2( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | Path where KV-V2 engine is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | str | Full named path of the secret. | | namespace | str | Target namespace. (requires Enterprise). | @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -135,7 +135,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- @@ -525,7 +525,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -842,7 +842,7 @@ dataVaultKvSecretsListV2.DataVaultKvSecretsListV2Config( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | Path where KV-V2 engine is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | str | Full named path of the secret. | | namespace | str | Target namespace. (requires Enterprise). | @@ -928,7 +928,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -940,7 +940,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -959,7 +959,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -973,7 +973,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.typescript.md b/docs/dataVaultKvSecretsListV2.typescript.md index c5da2fe2..944a58d4 100644 --- a/docs/dataVaultKvSecretsListV2.typescript.md +++ b/docs/dataVaultKvSecretsListV2.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -691,7 +691,7 @@ const dataVaultKvSecretsListV2Config: dataVaultKvSecretsListV2.DataVaultKvSecret | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | mount | string | Path where KV-V2 engine is mounted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | string | Full named path of the secret. | | namespace | string | Target namespace. (requires Enterprise). | @@ -777,7 +777,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -789,7 +789,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -808,7 +808,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -822,7 +822,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.csharp.md b/docs/dataVaultLdapDynamicCredentials.csharp.md index a0985ebe..fca17307 100644 --- a/docs/dataVaultLdapDynamicCredentials.csharp.md +++ b/docs/dataVaultLdapDynamicCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -741,7 +741,7 @@ new DataVaultLdapDynamicCredentialsConfig { | Provisioners | object[] | *No description.* | | Mount | string | LDAP Secret Backend to read credentials from. | | RoleName | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -826,7 +826,7 @@ public string Mount { get; set; } LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -840,7 +840,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -852,7 +852,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -869,7 +869,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.go.md b/docs/dataVaultLdapDynamicCredentials.go.md index 9a359b44..1cab4dba 100644 --- a/docs/dataVaultLdapDynamicCredentials.go.md +++ b/docs/dataVaultLdapDynamicCredentials.go.md @@ -4,12 +4,12 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.NewDataVaultLdapDynamicCredentials(scope Construct, id *string, config DataVaultLdapDynamicCredentialsConfig) DataVaultLdapDynamicCredentials ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsTerraformEleme ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_IsTerraformDataS ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapdynamiccredentials" datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -711,7 +711,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamiccredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapdynamiccredentials" &datavaultldapdynamiccredentials.DataVaultLdapDynamicCredentialsConfig { Connection: interface{}, @@ -741,7 +741,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapdynamicc | Provisioners | *[]interface{} | *No description.* | | Mount | *string | LDAP Secret Backend to read credentials from. | | RoleName | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -826,7 +826,7 @@ Mount *string LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -840,7 +840,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -852,7 +852,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -869,7 +869,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.java.md b/docs/dataVaultLdapDynamicCredentials.java.md index 4ae43206..46780ab2 100644 --- a/docs/dataVaultLdapDynamicCredentials.java.md +++ b/docs/dataVaultLdapDynamicCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers @@ -43,7 +43,7 @@ DataVaultLdapDynamicCredentials.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | mount | java.lang.String | LDAP Secret Backend to read credentials from. | | roleName | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -848,7 +848,7 @@ DataVaultLdapDynamicCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | mount | java.lang.String | LDAP Secret Backend to read credentials from. | | roleName | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -933,7 +933,7 @@ public java.lang.String getMount(); LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -947,7 +947,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -959,7 +959,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.python.md b/docs/dataVaultLdapDynamicCredentials.python.md index db332ef6..bc2ca269 100644 --- a/docs/dataVaultLdapDynamicCredentials.python.md +++ b/docs/dataVaultLdapDynamicCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers @@ -41,7 +41,7 @@ dataVaultLdapDynamicCredentials.DataVaultLdapDynamicCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | LDAP Secret Backend to read credentials from. | | role_name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -878,7 +878,7 @@ dataVaultLdapDynamicCredentials.DataVaultLdapDynamicCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | LDAP Secret Backend to read credentials from. | | role_name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -963,7 +963,7 @@ mount: str LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -977,7 +977,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -989,7 +989,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1006,7 +1006,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.typescript.md b/docs/dataVaultLdapDynamicCredentials.typescript.md index 54e07807..072dc551 100644 --- a/docs/dataVaultLdapDynamicCredentials.typescript.md +++ b/docs/dataVaultLdapDynamicCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -729,7 +729,7 @@ const dataVaultLdapDynamicCredentialsConfig: dataVaultLdapDynamicCredentials.Dat | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | mount | string | LDAP Secret Backend to read credentials from. | | roleName | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -814,7 +814,7 @@ public readonly mount: string; LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -828,7 +828,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -840,7 +840,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -857,7 +857,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.csharp.md b/docs/dataVaultLdapStaticCredentials.csharp.md index ae7e1bdb..6dc49f17 100644 --- a/docs/dataVaultLdapStaticCredentials.csharp.md +++ b/docs/dataVaultLdapStaticCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -752,7 +752,7 @@ new DataVaultLdapStaticCredentialsConfig { | Provisioners | object[] | *No description.* | | Mount | string | LDAP Secret Backend to read credentials from. | | RoleName | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -837,7 +837,7 @@ public string Mount { get; set; } LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -851,7 +851,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -863,7 +863,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -880,7 +880,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.go.md b/docs/dataVaultLdapStaticCredentials.go.md index 309b5032..7f0b2d63 100644 --- a/docs/dataVaultLdapStaticCredentials.go.md +++ b/docs/dataVaultLdapStaticCredentials.go.md @@ -4,12 +4,12 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapstaticcredentials" datavaultldapstaticcredentials.NewDataVaultLdapStaticCredentials(scope Construct, id *string, config DataVaultLdapStaticCredentialsConfig) DataVaultLdapStaticCredentials ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapstaticcredentials" datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapstaticcredentials" datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsTerraformElement ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapstaticcredentials" datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_IsTerraformDataSou ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapstaticcredentials" datavaultldapstaticcredentials.DataVaultLdapStaticCredentials_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -722,7 +722,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcredentials" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapstaticcredentials" &datavaultldapstaticcredentials.DataVaultLdapStaticCredentialsConfig { Connection: interface{}, @@ -752,7 +752,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultldapstaticcr | Provisioners | *[]interface{} | *No description.* | | Mount | *string | LDAP Secret Backend to read credentials from. | | RoleName | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -837,7 +837,7 @@ Mount *string LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -851,7 +851,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -863,7 +863,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -880,7 +880,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.java.md b/docs/dataVaultLdapStaticCredentials.java.md index a85d74f0..831a06a3 100644 --- a/docs/dataVaultLdapStaticCredentials.java.md +++ b/docs/dataVaultLdapStaticCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers @@ -43,7 +43,7 @@ DataVaultLdapStaticCredentials.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | mount | java.lang.String | LDAP Secret Backend to read credentials from. | | roleName | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -859,7 +859,7 @@ DataVaultLdapStaticCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | mount | java.lang.String | LDAP Secret Backend to read credentials from. | | roleName | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -944,7 +944,7 @@ public java.lang.String getMount(); LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -958,7 +958,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -970,7 +970,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -987,7 +987,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.python.md b/docs/dataVaultLdapStaticCredentials.python.md index 61a723bb..9e31af39 100644 --- a/docs/dataVaultLdapStaticCredentials.python.md +++ b/docs/dataVaultLdapStaticCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers @@ -41,7 +41,7 @@ dataVaultLdapStaticCredentials.DataVaultLdapStaticCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | LDAP Secret Backend to read credentials from. | | role_name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -889,7 +889,7 @@ dataVaultLdapStaticCredentials.DataVaultLdapStaticCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | LDAP Secret Backend to read credentials from. | | role_name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -974,7 +974,7 @@ mount: str LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -988,7 +988,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -1000,7 +1000,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1017,7 +1017,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.typescript.md b/docs/dataVaultLdapStaticCredentials.typescript.md index 693bd4b7..a23a0326 100644 --- a/docs/dataVaultLdapStaticCredentials.typescript.md +++ b/docs/dataVaultLdapStaticCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -740,7 +740,7 @@ const dataVaultLdapStaticCredentialsConfig: dataVaultLdapStaticCredentials.DataV | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | mount | string | LDAP Secret Backend to read credentials from. | | roleName | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -825,7 +825,7 @@ public readonly mount: string; LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -839,7 +839,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -851,7 +851,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -868,7 +868,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.csharp.md b/docs/dataVaultNomadAccessToken.csharp.md index 7d38445b..385b51d2 100644 --- a/docs/dataVaultNomadAccessToken.csharp.md +++ b/docs/dataVaultNomadAccessToken.csharp.md @@ -4,7 +4,7 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -697,7 +697,7 @@ new DataVaultNomadAccessTokenConfig { | Provisioners | object[] | *No description.* | | Backend | string | Nomad secret backend to generate tokens from. | | Role | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -782,7 +782,7 @@ public string Backend { get; set; } Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -796,7 +796,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -808,7 +808,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -825,7 +825,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.go.md b/docs/dataVaultNomadAccessToken.go.md index c1e71b8d..c317c620 100644 --- a/docs/dataVaultNomadAccessToken.go.md +++ b/docs/dataVaultNomadAccessToken.go.md @@ -4,12 +4,12 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnomadaccesstoken" datavaultnomadaccesstoken.NewDataVaultNomadAccessToken(scope Construct, id *string, config DataVaultNomadAccessTokenConfig) DataVaultNomadAccessToken ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnomadaccesstoken" datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnomadaccesstoken" datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsTerraformElement(x interfa ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnomadaccesstoken" datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultnomadaccesstoken.DataVaultNomadAccessToken_IsTerraformDataSource(x inte ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnomadaccesstoken" datavaultnomadaccesstoken.DataVaultNomadAccessToken_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -667,7 +667,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesstoken" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnomadaccesstoken" &datavaultnomadaccesstoken.DataVaultNomadAccessTokenConfig { Connection: interface{}, @@ -697,7 +697,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultnomadaccesst | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Nomad secret backend to generate tokens from. | | Role | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -782,7 +782,7 @@ Backend *string Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -796,7 +796,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -808,7 +808,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -825,7 +825,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.java.md b/docs/dataVaultNomadAccessToken.java.md index 60cfde10..eeb91f0a 100644 --- a/docs/dataVaultNomadAccessToken.java.md +++ b/docs/dataVaultNomadAccessToken.java.md @@ -4,7 +4,7 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers @@ -43,7 +43,7 @@ DataVaultNomadAccessToken.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Nomad secret backend to generate tokens from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -804,7 +804,7 @@ DataVaultNomadAccessTokenConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Nomad secret backend to generate tokens from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -889,7 +889,7 @@ public java.lang.String getBackend(); Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -903,7 +903,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -915,7 +915,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -932,7 +932,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.python.md b/docs/dataVaultNomadAccessToken.python.md index 298d2143..adef6db9 100644 --- a/docs/dataVaultNomadAccessToken.python.md +++ b/docs/dataVaultNomadAccessToken.python.md @@ -4,7 +4,7 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers @@ -41,7 +41,7 @@ dataVaultNomadAccessToken.DataVaultNomadAccessToken( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Nomad secret backend to generate tokens from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ dataVaultNomadAccessToken.DataVaultNomadAccessTokenConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Nomad secret backend to generate tokens from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -919,7 +919,7 @@ backend: str Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -933,7 +933,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -945,7 +945,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -962,7 +962,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.typescript.md b/docs/dataVaultNomadAccessToken.typescript.md index 7b037a2e..f796b124 100644 --- a/docs/dataVaultNomadAccessToken.typescript.md +++ b/docs/dataVaultNomadAccessToken.typescript.md @@ -4,7 +4,7 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -685,7 +685,7 @@ const dataVaultNomadAccessTokenConfig: dataVaultNomadAccessToken.DataVaultNomadA | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Nomad secret backend to generate tokens from. | | role | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -770,7 +770,7 @@ public readonly backend: string; Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -784,7 +784,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -796,7 +796,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -813,7 +813,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.csharp.md b/docs/dataVaultPkiSecretBackendIssuer.csharp.md index aac51ea2..701c4288 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.csharp.md +++ b/docs/dataVaultPkiSecretBackendIssuer.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -763,7 +763,7 @@ new DataVaultPkiSecretBackendIssuerConfig { | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | | IssuerRef | string | Reference to an existing issuer. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -848,7 +848,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -862,7 +862,7 @@ public string IssuerRef { get; set; } Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -874,7 +874,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -891,7 +891,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.go.md b/docs/dataVaultPkiSecretBackendIssuer.go.md index dd6a3e61..15e932be 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.go.md +++ b/docs/dataVaultPkiSecretBackendIssuer.go.md @@ -4,12 +4,12 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.NewDataVaultPkiSecretBackendIssuer(scope Construct, id *string, config DataVaultPkiSecretBackendIssuerConfig) DataVaultPkiSecretBackendIssuer ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsTerraformEleme ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_IsTerraformDataS ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuer" datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuer_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -733,7 +733,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuer" &datavaultpkisecretbackendissuer.DataVaultPkiSecretBackendIssuerConfig { Connection: interface{}, @@ -763,7 +763,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbac | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | | IssuerRef | *string | Reference to an existing issuer. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -848,7 +848,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -862,7 +862,7 @@ IssuerRef *string Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -874,7 +874,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -891,7 +891,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.java.md b/docs/dataVaultPkiSecretBackendIssuer.java.md index 3ade4f90..0331a999 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.java.md +++ b/docs/dataVaultPkiSecretBackendIssuer.java.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -43,7 +43,7 @@ DataVaultPkiSecretBackendIssuer.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | issuerRef | java.lang.String | Reference to an existing issuer. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -870,7 +870,7 @@ DataVaultPkiSecretBackendIssuerConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | issuerRef | java.lang.String | Reference to an existing issuer. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -955,7 +955,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -969,7 +969,7 @@ public java.lang.String getIssuerRef(); Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -981,7 +981,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -998,7 +998,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.python.md b/docs/dataVaultPkiSecretBackendIssuer.python.md index 8c1f7ea5..61214671 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.python.md +++ b/docs/dataVaultPkiSecretBackendIssuer.python.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -41,7 +41,7 @@ dataVaultPkiSecretBackendIssuer.DataVaultPkiSecretBackendIssuer( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | issuer_ref | str | Reference to an existing issuer. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -900,7 +900,7 @@ dataVaultPkiSecretBackendIssuer.DataVaultPkiSecretBackendIssuerConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | issuer_ref | str | Reference to an existing issuer. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -985,7 +985,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -999,7 +999,7 @@ issuer_ref: str Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -1011,7 +1011,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.typescript.md b/docs/dataVaultPkiSecretBackendIssuer.typescript.md index a472c798..41314786 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.typescript.md +++ b/docs/dataVaultPkiSecretBackendIssuer.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -751,7 +751,7 @@ const dataVaultPkiSecretBackendIssuerConfig: dataVaultPkiSecretBackendIssuer.Dat | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | | issuerRef | string | Reference to an existing issuer. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -836,7 +836,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -850,7 +850,7 @@ public readonly issuerRef: string; Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -862,7 +862,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -879,7 +879,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.csharp.md b/docs/dataVaultPkiSecretBackendIssuers.csharp.md index 832058be..2b37a0c2 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.csharp.md +++ b/docs/dataVaultPkiSecretBackendIssuers.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -684,7 +684,7 @@ new DataVaultPkiSecretBackendIssuersConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -769,7 +769,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -781,7 +781,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -798,7 +798,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.go.md b/docs/dataVaultPkiSecretBackendIssuers.go.md index 7a5ac0eb..002706ca 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.go.md +++ b/docs/dataVaultPkiSecretBackendIssuers.go.md @@ -4,12 +4,12 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.NewDataVaultPkiSecretBackendIssuers(scope Construct, id *string, config DataVaultPkiSecretBackendIssuersConfig) DataVaultPkiSecretBackendIssuers ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsTerraformEle ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_IsTerraformDat ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuers" datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuers_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -656,7 +656,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendissuers" &datavaultpkisecretbackendissuers.DataVaultPkiSecretBackendIssuersConfig { Connection: interface{}, @@ -684,7 +684,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbac | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -769,7 +769,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -781,7 +781,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -798,7 +798,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.java.md b/docs/dataVaultPkiSecretBackendIssuers.java.md index c5cd66c6..7f637aa2 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.java.md +++ b/docs/dataVaultPkiSecretBackendIssuers.java.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers @@ -41,7 +41,7 @@ DataVaultPkiSecretBackendIssuers.Builder.create(Construct scope, java.lang.Strin | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -779,7 +779,7 @@ DataVaultPkiSecretBackendIssuersConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -864,7 +864,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -876,7 +876,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -893,7 +893,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.python.md b/docs/dataVaultPkiSecretBackendIssuers.python.md index f409c809..d6d6e1f7 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.python.md +++ b/docs/dataVaultPkiSecretBackendIssuers.python.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers @@ -39,7 +39,7 @@ dataVaultPkiSecretBackendIssuers.DataVaultPkiSecretBackendIssuers( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -809,7 +809,7 @@ dataVaultPkiSecretBackendIssuers.DataVaultPkiSecretBackendIssuersConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -894,7 +894,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -906,7 +906,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -923,7 +923,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.typescript.md b/docs/dataVaultPkiSecretBackendIssuers.typescript.md index 198f657b..fdd3854d 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.typescript.md +++ b/docs/dataVaultPkiSecretBackendIssuers.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -673,7 +673,7 @@ const dataVaultPkiSecretBackendIssuersConfig: dataVaultPkiSecretBackendIssuers.D | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -758,7 +758,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -770,7 +770,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -787,7 +787,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.csharp.md b/docs/dataVaultPkiSecretBackendKey.csharp.md index 79042edd..89cff320 100644 --- a/docs/dataVaultPkiSecretBackendKey.csharp.md +++ b/docs/dataVaultPkiSecretBackendKey.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -708,7 +708,7 @@ new DataVaultPkiSecretBackendKeyConfig { | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | | KeyRef | string | Reference to an existing key. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -793,7 +793,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -807,7 +807,7 @@ public string KeyRef { get; set; } Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -819,7 +819,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -836,7 +836,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.go.md b/docs/dataVaultPkiSecretBackendKey.go.md index 6ed177f2..60384672 100644 --- a/docs/dataVaultPkiSecretBackendKey.go.md +++ b/docs/dataVaultPkiSecretBackendKey.go.md @@ -4,12 +4,12 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.NewDataVaultPkiSecretBackendKey(scope Construct, id *string, config DataVaultPkiSecretBackendKeyConfig) DataVaultPkiSecretBackendKey ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsTerraformElement(x i ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_IsTerraformDataSource( ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkey" datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKey_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -678,7 +678,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkey" &datavaultpkisecretbackendkey.DataVaultPkiSecretBackendKeyConfig { Connection: interface{}, @@ -708,7 +708,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbac | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | | KeyRef | *string | Reference to an existing key. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -793,7 +793,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -807,7 +807,7 @@ KeyRef *string Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -819,7 +819,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -836,7 +836,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.java.md b/docs/dataVaultPkiSecretBackendKey.java.md index bc89a25c..2ec8c287 100644 --- a/docs/dataVaultPkiSecretBackendKey.java.md +++ b/docs/dataVaultPkiSecretBackendKey.java.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -43,7 +43,7 @@ DataVaultPkiSecretBackendKey.Builder.create(Construct scope, java.lang.String id | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | keyRef | java.lang.String | Reference to an existing key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -815,7 +815,7 @@ DataVaultPkiSecretBackendKeyConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | keyRef | java.lang.String | Reference to an existing key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -900,7 +900,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -914,7 +914,7 @@ public java.lang.String getKeyRef(); Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -926,7 +926,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -943,7 +943,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.python.md b/docs/dataVaultPkiSecretBackendKey.python.md index 0b9146c9..f4b1cd0d 100644 --- a/docs/dataVaultPkiSecretBackendKey.python.md +++ b/docs/dataVaultPkiSecretBackendKey.python.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -41,7 +41,7 @@ dataVaultPkiSecretBackendKey.DataVaultPkiSecretBackendKey( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | key_ref | str | Reference to an existing key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -845,7 +845,7 @@ dataVaultPkiSecretBackendKey.DataVaultPkiSecretBackendKeyConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | key_ref | str | Reference to an existing key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -930,7 +930,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -944,7 +944,7 @@ key_ref: str Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -956,7 +956,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -973,7 +973,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.typescript.md b/docs/dataVaultPkiSecretBackendKey.typescript.md index fc6f27ff..e32b3bbb 100644 --- a/docs/dataVaultPkiSecretBackendKey.typescript.md +++ b/docs/dataVaultPkiSecretBackendKey.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -696,7 +696,7 @@ const dataVaultPkiSecretBackendKeyConfig: dataVaultPkiSecretBackendKey.DataVault | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | | keyRef | string | Reference to an existing key. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -781,7 +781,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -795,7 +795,7 @@ public readonly keyRef: string; Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -807,7 +807,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -824,7 +824,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.csharp.md b/docs/dataVaultPkiSecretBackendKeys.csharp.md index 62008338..59ed5d84 100644 --- a/docs/dataVaultPkiSecretBackendKeys.csharp.md +++ b/docs/dataVaultPkiSecretBackendKeys.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -684,7 +684,7 @@ new DataVaultPkiSecretBackendKeysConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -769,7 +769,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -781,7 +781,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -798,7 +798,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.go.md b/docs/dataVaultPkiSecretBackendKeys.go.md index be570a09..27bfefa6 100644 --- a/docs/dataVaultPkiSecretBackendKeys.go.md +++ b/docs/dataVaultPkiSecretBackendKeys.go.md @@ -4,12 +4,12 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.NewDataVaultPkiSecretBackendKeys(scope Construct, id *string, config DataVaultPkiSecretBackendKeysConfig) DataVaultPkiSecretBackendKeys ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsTerraformElement(x ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_IsTerraformDataSourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkeys" datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeys_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -656,7 +656,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbackendkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbackendkeys" &datavaultpkisecretbackendkeys.DataVaultPkiSecretBackendKeysConfig { Connection: interface{}, @@ -684,7 +684,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpkisecretbac | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -769,7 +769,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -781,7 +781,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -798,7 +798,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.java.md b/docs/dataVaultPkiSecretBackendKeys.java.md index 19463fac..56ae47a2 100644 --- a/docs/dataVaultPkiSecretBackendKeys.java.md +++ b/docs/dataVaultPkiSecretBackendKeys.java.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers @@ -41,7 +41,7 @@ DataVaultPkiSecretBackendKeys.Builder.create(Construct scope, java.lang.String i | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -779,7 +779,7 @@ DataVaultPkiSecretBackendKeysConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -864,7 +864,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -876,7 +876,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -893,7 +893,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.python.md b/docs/dataVaultPkiSecretBackendKeys.python.md index 486c7677..b8e1e218 100644 --- a/docs/dataVaultPkiSecretBackendKeys.python.md +++ b/docs/dataVaultPkiSecretBackendKeys.python.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers @@ -39,7 +39,7 @@ dataVaultPkiSecretBackendKeys.DataVaultPkiSecretBackendKeys( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -809,7 +809,7 @@ dataVaultPkiSecretBackendKeys.DataVaultPkiSecretBackendKeysConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -894,7 +894,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -906,7 +906,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -923,7 +923,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.typescript.md b/docs/dataVaultPkiSecretBackendKeys.typescript.md index d36d5eae..86533b94 100644 --- a/docs/dataVaultPkiSecretBackendKeys.typescript.md +++ b/docs/dataVaultPkiSecretBackendKeys.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -673,7 +673,7 @@ const dataVaultPkiSecretBackendKeysConfig: dataVaultPkiSecretBackendKeys.DataVau | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -758,7 +758,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -770,7 +770,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -787,7 +787,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPolicyDocument.csharp.md b/docs/dataVaultPolicyDocument.csharp.md index 123ab114..e25a3966 100644 --- a/docs/dataVaultPolicyDocument.csharp.md +++ b/docs/dataVaultPolicyDocument.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers @@ -399,7 +399,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -681,7 +681,7 @@ new DataVaultPolicyDocumentConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Rule | object | rule block. | @@ -765,7 +765,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -782,7 +782,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -796,7 +796,7 @@ public object Rule { get; set; } rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -823,14 +823,14 @@ new DataVaultPolicyDocumentRule { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Capabilities | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| Capabilities | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | AllowedParameter | object | allowed_parameter block. | | DeniedParameter | object | denied_parameter block. | -| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| MaxWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| MinWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| RequiredParameters | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| MaxWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| MinWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| RequiredParameters | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -842,7 +842,7 @@ public string[] Capabilities { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -854,7 +854,7 @@ public string Path { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -868,7 +868,7 @@ public object AllowedParameter { get; set; } allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -882,7 +882,7 @@ public object DeniedParameter { get; set; } denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -894,7 +894,7 @@ public string Description { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -906,7 +906,7 @@ public string MaxWrappingTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -918,7 +918,7 @@ public string MinWrappingTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -930,7 +930,7 @@ public string[] RequiredParameters { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -951,8 +951,8 @@ new DataVaultPolicyDocumentRuleAllowedParameter { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| Value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| Key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| Value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -964,7 +964,7 @@ public string Key { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -976,7 +976,7 @@ public string[] Value { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -997,8 +997,8 @@ new DataVaultPolicyDocumentRuleDeniedParameter { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| Value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| Key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| Value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1010,7 +1010,7 @@ public string Key { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1022,7 +1022,7 @@ public string[] Value { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- diff --git a/docs/dataVaultPolicyDocument.go.md b/docs/dataVaultPolicyDocument.go.md index 9a52fb0c..59717d63 100644 --- a/docs/dataVaultPolicyDocument.go.md +++ b/docs/dataVaultPolicyDocument.go.md @@ -4,12 +4,12 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocument(scope Construct, id *string, config DataVaultPolicyDocumentConfig) DataVaultPolicyDocument ``` @@ -310,7 +310,7 @@ func ResetRule() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.DataVaultPolicyDocument_IsConstruct(x interface{}) *bool ``` @@ -342,7 +342,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.DataVaultPolicyDocument_IsTerraformElement(x interface{}) *bool ``` @@ -356,7 +356,7 @@ datavaultpolicydocument.DataVaultPolicyDocument_IsTerraformElement(x interface{} ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.DataVaultPolicyDocument_IsTerraformDataSource(x interface{}) *bool ``` @@ -370,7 +370,7 @@ datavaultpolicydocument.DataVaultPolicyDocument_IsTerraformDataSource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.DataVaultPolicyDocument_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -399,7 +399,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -654,7 +654,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" &datavaultpolicydocument.DataVaultPolicyDocumentConfig { Connection: interface{}, @@ -681,7 +681,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocume | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Rule | interface{} | rule block. | @@ -765,7 +765,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -782,7 +782,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -796,7 +796,7 @@ Rule interface{} rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -805,7 +805,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" &datavaultpolicydocument.DataVaultPolicyDocumentRule { Capabilities: *[]*string, @@ -823,14 +823,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocume | **Name** | **Type** | **Description** | | --- | --- | --- | -| Capabilities | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| Capabilities | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | AllowedParameter | interface{} | allowed_parameter block. | | DeniedParameter | interface{} | denied_parameter block. | -| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| MaxWrappingTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| MinWrappingTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| RequiredParameters | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| MaxWrappingTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| MinWrappingTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| RequiredParameters | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -842,7 +842,7 @@ Capabilities *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -854,7 +854,7 @@ Path *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -868,7 +868,7 @@ AllowedParameter interface{} allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -882,7 +882,7 @@ DeniedParameter interface{} denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -894,7 +894,7 @@ Description *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -906,7 +906,7 @@ MaxWrappingTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -918,7 +918,7 @@ MinWrappingTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -930,7 +930,7 @@ RequiredParameters *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -939,7 +939,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" &datavaultpolicydocument.DataVaultPolicyDocumentRuleAllowedParameter { Key: *string, @@ -951,8 +951,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocume | **Name** | **Type** | **Description** | | --- | --- | --- | -| Key | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| Value | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| Key | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| Value | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -964,7 +964,7 @@ Key *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -976,7 +976,7 @@ Value *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -985,7 +985,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" &datavaultpolicydocument.DataVaultPolicyDocumentRuleDeniedParameter { Key: *string, @@ -997,8 +997,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocume | **Name** | **Type** | **Description** | | --- | --- | --- | -| Key | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| Value | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| Key | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| Value | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1010,7 +1010,7 @@ Key *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1022,7 +1022,7 @@ Value *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -1033,7 +1033,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleAllowedParameterList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DataVaultPolicyDocumentRuleAllowedParameterList ``` @@ -1193,7 +1193,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleAllowedParameterOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DataVaultPolicyDocumentRuleAllowedParameterOutputReference ``` @@ -1504,7 +1504,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleDeniedParameterList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DataVaultPolicyDocumentRuleDeniedParameterList ``` @@ -1664,7 +1664,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleDeniedParameterOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DataVaultPolicyDocumentRuleDeniedParameterOutputReference ``` @@ -1975,7 +1975,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DataVaultPolicyDocumentRuleList ``` @@ -2135,7 +2135,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultpolicydocument" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocument" datavaultpolicydocument.NewDataVaultPolicyDocumentRuleOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DataVaultPolicyDocumentRuleOutputReference ``` diff --git a/docs/dataVaultPolicyDocument.java.md b/docs/dataVaultPolicyDocument.java.md index 05d7aee4..6703767a 100644 --- a/docs/dataVaultPolicyDocument.java.md +++ b/docs/dataVaultPolicyDocument.java.md @@ -4,7 +4,7 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers @@ -41,7 +41,7 @@ DataVaultPolicyDocument.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rule | com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRule> | rule block. | @@ -111,7 +111,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -124,7 +124,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -491,7 +491,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -778,7 +778,7 @@ DataVaultPolicyDocumentConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rule | com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRule> | rule block. | @@ -862,7 +862,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -879,7 +879,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -893,7 +893,7 @@ public java.lang.Object getRule(); rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -922,14 +922,14 @@ DataVaultPolicyDocumentRule.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| capabilities | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| capabilities | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | allowedParameter | com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRuleAllowedParameter> | allowed_parameter block. | | deniedParameter | com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRuleDeniedParameter> | denied_parameter block. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| maxWrappingTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| minWrappingTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| requiredParameters | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| maxWrappingTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| minWrappingTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| requiredParameters | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -941,7 +941,7 @@ public java.util.List getCapabilities(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -953,7 +953,7 @@ public java.lang.String getPath(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -967,7 +967,7 @@ public java.lang.Object getAllowedParameter(); allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -981,7 +981,7 @@ public java.lang.Object getDeniedParameter(); denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -993,7 +993,7 @@ public java.lang.String getDescription(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -1005,7 +1005,7 @@ public java.lang.String getMaxWrappingTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -1017,7 +1017,7 @@ public java.lang.String getMinWrappingTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -1029,7 +1029,7 @@ public java.util.List getRequiredParameters(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -1050,8 +1050,8 @@ DataVaultPolicyDocumentRuleAllowedParameter.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1063,7 +1063,7 @@ public java.lang.String getKey(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1075,7 +1075,7 @@ public java.util.List getValue(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -1096,8 +1096,8 @@ DataVaultPolicyDocumentRuleDeniedParameter.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1109,7 +1109,7 @@ public java.lang.String getKey(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1121,7 +1121,7 @@ public java.util.List getValue(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- diff --git a/docs/dataVaultPolicyDocument.python.md b/docs/dataVaultPolicyDocument.python.md index 59f52915..b81c97c7 100644 --- a/docs/dataVaultPolicyDocument.python.md +++ b/docs/dataVaultPolicyDocument.python.md @@ -4,7 +4,7 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers @@ -38,7 +38,7 @@ dataVaultPolicyDocument.DataVaultPolicyDocument( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rule | typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRule]] | rule block. | @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -526,7 +526,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -808,7 +808,7 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rule | typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRule]] | rule block. | @@ -892,7 +892,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -909,7 +909,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -923,7 +923,7 @@ rule: typing.Union[IResolvable, typing.List[DataVaultPolicyDocumentRule]] rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -950,14 +950,14 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentRule( | **Name** | **Type** | **Description** | | --- | --- | --- | -| capabilities | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| capabilities | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | allowed_parameter | typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRuleAllowedParameter]] | allowed_parameter block. | | denied_parameter | typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRuleDeniedParameter]] | denied_parameter block. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| max_wrapping_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| min_wrapping_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| required_parameters | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| max_wrapping_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| min_wrapping_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| required_parameters | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -969,7 +969,7 @@ capabilities: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -981,7 +981,7 @@ path: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -995,7 +995,7 @@ allowed_parameter: typing.Union[IResolvable, typing.List[DataVaultPolicyDocument allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -1009,7 +1009,7 @@ denied_parameter: typing.Union[IResolvable, typing.List[DataVaultPolicyDocumentR denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -1021,7 +1021,7 @@ description: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -1033,7 +1033,7 @@ max_wrapping_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -1045,7 +1045,7 @@ min_wrapping_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -1057,7 +1057,7 @@ required_parameters: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -1078,8 +1078,8 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentRuleAllowedParameter( | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1091,7 +1091,7 @@ key: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1103,7 +1103,7 @@ value: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -1124,8 +1124,8 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentRuleDeniedParameter( | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1137,7 +1137,7 @@ key: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1149,7 +1149,7 @@ value: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- diff --git a/docs/dataVaultPolicyDocument.typescript.md b/docs/dataVaultPolicyDocument.typescript.md index 629ed0b5..ca8bdb3d 100644 --- a/docs/dataVaultPolicyDocument.typescript.md +++ b/docs/dataVaultPolicyDocument.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers @@ -399,7 +399,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -670,7 +670,7 @@ const dataVaultPolicyDocumentConfig: dataVaultPolicyDocument.DataVaultPolicyDocu | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | string | Target namespace. (requires Enterprise). | | rule | cdktf.IResolvable \| DataVaultPolicyDocumentRule[] | rule block. | @@ -754,7 +754,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -771,7 +771,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -785,7 +785,7 @@ public readonly rule: IResolvable | DataVaultPolicyDocumentRule[]; rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -803,14 +803,14 @@ const dataVaultPolicyDocumentRule: dataVaultPolicyDocument.DataVaultPolicyDocume | **Name** | **Type** | **Description** | | --- | --- | --- | -| capabilities | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| capabilities | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | allowedParameter | cdktf.IResolvable \| DataVaultPolicyDocumentRuleAllowedParameter[] | allowed_parameter block. | | deniedParameter | cdktf.IResolvable \| DataVaultPolicyDocumentRuleDeniedParameter[] | denied_parameter block. | -| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| maxWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| minWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| requiredParameters | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| maxWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| minWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| requiredParameters | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -822,7 +822,7 @@ public readonly capabilities: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -834,7 +834,7 @@ public readonly path: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -848,7 +848,7 @@ public readonly allowedParameter: IResolvable | DataVaultPolicyDocumentRuleAllow allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -862,7 +862,7 @@ public readonly deniedParameter: IResolvable | DataVaultPolicyDocumentRuleDenied denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -874,7 +874,7 @@ public readonly description: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -886,7 +886,7 @@ public readonly maxWrappingTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -898,7 +898,7 @@ public readonly minWrappingTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -910,7 +910,7 @@ public readonly requiredParameters: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -928,8 +928,8 @@ const dataVaultPolicyDocumentRuleAllowedParameter: dataVaultPolicyDocument.DataV | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -941,7 +941,7 @@ public readonly key: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -953,7 +953,7 @@ public readonly value: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -971,8 +971,8 @@ const dataVaultPolicyDocumentRuleDeniedParameter: dataVaultPolicyDocument.DataVa | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -984,7 +984,7 @@ public readonly key: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -996,7 +996,7 @@ public readonly value: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- diff --git a/docs/dataVaultRaftAutopilotState.csharp.md b/docs/dataVaultRaftAutopilotState.csharp.md index 727c8a8e..2ab15d99 100644 --- a/docs/dataVaultRaftAutopilotState.csharp.md +++ b/docs/dataVaultRaftAutopilotState.csharp.md @@ -4,7 +4,7 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -748,7 +748,7 @@ new DataVaultRaftAutopilotStateConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -831,7 +831,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -848,7 +848,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultRaftAutopilotState.go.md b/docs/dataVaultRaftAutopilotState.go.md index d6634093..f28df013 100644 --- a/docs/dataVaultRaftAutopilotState.go.md +++ b/docs/dataVaultRaftAutopilotState.go.md @@ -4,12 +4,12 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultraftautopilotstate" datavaultraftautopilotstate.NewDataVaultRaftAutopilotState(scope Construct, id *string, config DataVaultRaftAutopilotStateConfig) DataVaultRaftAutopilotState ``` @@ -290,7 +290,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultraftautopilotstate" datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsConstruct(x interface{}) *bool ``` @@ -322,7 +322,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultraftautopilotstate" datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsTerraformElement(x interface{}) *bool ``` @@ -336,7 +336,7 @@ datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsTerraformElement(x int ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultraftautopilotstate" datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsTerraformDataSource(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaultraftautopilotstate.DataVaultRaftAutopilotState_IsTerraformDataSource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultraftautopilotstate" datavaultraftautopilotstate.DataVaultRaftAutopilotState_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -722,7 +722,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilotstate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultraftautopilotstate" &datavaultraftautopilotstate.DataVaultRaftAutopilotStateConfig { Connection: interface{}, @@ -748,7 +748,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaultraftautopilo | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -831,7 +831,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -848,7 +848,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultRaftAutopilotState.java.md b/docs/dataVaultRaftAutopilotState.java.md index 71426363..959de858 100644 --- a/docs/dataVaultRaftAutopilotState.java.md +++ b/docs/dataVaultRaftAutopilotState.java.md @@ -4,7 +4,7 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers @@ -39,7 +39,7 @@ DataVaultRaftAutopilotState.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- @@ -458,7 +458,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -831,7 +831,7 @@ DataVaultRaftAutopilotStateConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -914,7 +914,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -931,7 +931,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultRaftAutopilotState.python.md b/docs/dataVaultRaftAutopilotState.python.md index 5a57b284..f57e7ccf 100644 --- a/docs/dataVaultRaftAutopilotState.python.md +++ b/docs/dataVaultRaftAutopilotState.python.md @@ -4,7 +4,7 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers @@ -37,7 +37,7 @@ dataVaultRaftAutopilotState.DataVaultRaftAutopilotState( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -106,7 +106,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -119,7 +119,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- @@ -492,7 +492,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -861,7 +861,7 @@ dataVaultRaftAutopilotState.DataVaultRaftAutopilotStateConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -944,7 +944,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -961,7 +961,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultRaftAutopilotState.typescript.md b/docs/dataVaultRaftAutopilotState.typescript.md index 58191f12..168c179a 100644 --- a/docs/dataVaultRaftAutopilotState.typescript.md +++ b/docs/dataVaultRaftAutopilotState.typescript.md @@ -4,7 +4,7 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -738,7 +738,7 @@ const dataVaultRaftAutopilotStateConfig: dataVaultRaftAutopilotState.DataVaultRa | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -821,7 +821,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -838,7 +838,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultTransformDecode.csharp.md b/docs/dataVaultTransformDecode.csharp.md index ae8785c5..6ab77068 100644 --- a/docs/dataVaultTransformDecode.csharp.md +++ b/docs/dataVaultTransformDecode.csharp.md @@ -4,7 +4,7 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -858,7 +858,7 @@ new DataVaultTransformDecodeConfig { | BatchInput | object | Specifies a list of items to be decoded in a single batch. | | BatchResults | object | The result of decoding batch_input. | | DecodedValue | string | The result of decoding a value. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Transformation | string | The transformation to perform. | | Tweak | string | The tweak value to use. Only applicable for FPE transformations. | @@ -946,7 +946,7 @@ public string Path { get; set; } Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -960,7 +960,7 @@ public string RoleName { get; set; } The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -976,7 +976,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -990,7 +990,7 @@ public object BatchResults { get; set; } The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -1004,7 +1004,7 @@ public string DecodedValue { get; set; } The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -1016,7 +1016,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1033,7 +1033,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1049,7 +1049,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1063,7 +1063,7 @@ public string Tweak { get; set; } The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1077,7 +1077,7 @@ public string Value { get; set; } The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformDecode.go.md b/docs/dataVaultTransformDecode.go.md index 03c9727c..d955ad04 100644 --- a/docs/dataVaultTransformDecode.go.md +++ b/docs/dataVaultTransformDecode.go.md @@ -4,12 +4,12 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformdecode" datavaulttransformdecode.NewDataVaultTransformDecode(scope Construct, id *string, config DataVaultTransformDecodeConfig) DataVaultTransformDecode ``` @@ -332,7 +332,7 @@ func ResetValue() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformdecode" datavaulttransformdecode.DataVaultTransformDecode_IsConstruct(x interface{}) *bool ``` @@ -364,7 +364,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformdecode" datavaulttransformdecode.DataVaultTransformDecode_IsTerraformElement(x interface{}) *bool ``` @@ -378,7 +378,7 @@ datavaulttransformdecode.DataVaultTransformDecode_IsTerraformElement(x interface ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformdecode" datavaulttransformdecode.DataVaultTransformDecode_IsTerraformDataSource(x interface{}) *bool ``` @@ -392,7 +392,7 @@ datavaulttransformdecode.DataVaultTransformDecode_IsTerraformDataSource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformdecode" datavaulttransformdecode.DataVaultTransformDecode_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -819,7 +819,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdecode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformdecode" &datavaulttransformdecode.DataVaultTransformDecodeConfig { Connection: interface{}, @@ -858,7 +858,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformdec | BatchInput | interface{} | Specifies a list of items to be decoded in a single batch. | | BatchResults | interface{} | The result of decoding batch_input. | | DecodedValue | *string | The result of decoding a value. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Transformation | *string | The transformation to perform. | | Tweak | *string | The tweak value to use. Only applicable for FPE transformations. | @@ -946,7 +946,7 @@ Path *string Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -960,7 +960,7 @@ RoleName *string The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -976,7 +976,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -990,7 +990,7 @@ BatchResults interface{} The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -1004,7 +1004,7 @@ DecodedValue *string The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -1016,7 +1016,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1033,7 +1033,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1049,7 +1049,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1063,7 +1063,7 @@ Tweak *string The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1077,7 +1077,7 @@ Value *string The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformDecode.java.md b/docs/dataVaultTransformDecode.java.md index e2fcb87d..254a747b 100644 --- a/docs/dataVaultTransformDecode.java.md +++ b/docs/dataVaultTransformDecode.java.md @@ -4,7 +4,7 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers @@ -54,7 +54,7 @@ DataVaultTransformDecode.Builder.create(Construct scope, java.lang.String id) | batchInput | com.hashicorp.cdktf.IResolvable OR java.util.List> | Specifies a list of items to be decoded in a single batch. | | batchResults | com.hashicorp.cdktf.IResolvable OR java.util.List> | The result of decoding batch_input. | | decodedValue | java.lang.String | The result of decoding a value. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformation | java.lang.String | The transformation to perform. | | tweak | java.lang.String | The tweak value to use. Only applicable for FPE transformations. | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -150,7 +150,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -203,7 +203,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- @@ -602,7 +602,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -1045,7 +1045,7 @@ DataVaultTransformDecodeConfig.builder() | batchInput | com.hashicorp.cdktf.IResolvable OR java.util.List> | Specifies a list of items to be decoded in a single batch. | | batchResults | com.hashicorp.cdktf.IResolvable OR java.util.List> | The result of decoding batch_input. | | decodedValue | java.lang.String | The result of decoding a value. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformation | java.lang.String | The transformation to perform. | | tweak | java.lang.String | The tweak value to use. Only applicable for FPE transformations. | @@ -1133,7 +1133,7 @@ public java.lang.String getPath(); Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -1147,7 +1147,7 @@ public java.lang.String getRoleName(); The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -1163,7 +1163,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -1177,7 +1177,7 @@ public java.lang.Object getBatchResults(); The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -1191,7 +1191,7 @@ public java.lang.String getDecodedValue(); The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -1203,7 +1203,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1220,7 +1220,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1236,7 +1236,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1250,7 +1250,7 @@ public java.lang.String getTweak(); The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1264,7 +1264,7 @@ public java.lang.String getValue(); The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformDecode.python.md b/docs/dataVaultTransformDecode.python.md index d781f0a5..8df490f8 100644 --- a/docs/dataVaultTransformDecode.python.md +++ b/docs/dataVaultTransformDecode.python.md @@ -4,7 +4,7 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers @@ -50,7 +50,7 @@ dataVaultTransformDecode.DataVaultTransformDecode( | batch_input | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | Specifies a list of items to be decoded in a single batch. | | batch_results | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | The result of decoding batch_input. | | decoded_value | str | The result of decoding a value. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformation | str | The transformation to perform. | | tweak | str | The tweak value to use. Only applicable for FPE transformations. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -146,7 +146,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -199,7 +199,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- @@ -634,7 +634,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -1071,7 +1071,7 @@ dataVaultTransformDecode.DataVaultTransformDecodeConfig( | batch_input | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | Specifies a list of items to be decoded in a single batch. | | batch_results | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | The result of decoding batch_input. | | decoded_value | str | The result of decoding a value. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformation | str | The transformation to perform. | | tweak | str | The tweak value to use. Only applicable for FPE transformations. | @@ -1159,7 +1159,7 @@ path: str Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -1173,7 +1173,7 @@ role_name: str The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -1189,7 +1189,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -1203,7 +1203,7 @@ batch_results: typing.Union[IResolvable, typing.List[typing.Mapping[str]]] The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -1217,7 +1217,7 @@ decoded_value: str The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -1229,7 +1229,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1246,7 +1246,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1262,7 +1262,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1276,7 +1276,7 @@ tweak: str The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1290,7 +1290,7 @@ value: str The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformDecode.typescript.md b/docs/dataVaultTransformDecode.typescript.md index 2d25d635..2014b81b 100644 --- a/docs/dataVaultTransformDecode.typescript.md +++ b/docs/dataVaultTransformDecode.typescript.md @@ -4,7 +4,7 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -840,7 +840,7 @@ const dataVaultTransformDecodeConfig: dataVaultTransformDecode.DataVaultTransfor | batchInput | cdktf.IResolvable \| {[ key: string ]: string}[] | Specifies a list of items to be decoded in a single batch. | | batchResults | cdktf.IResolvable \| {[ key: string ]: string}[] | The result of decoding batch_input. | | decodedValue | string | The result of decoding a value. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | string | Target namespace. (requires Enterprise). | | transformation | string | The transformation to perform. | | tweak | string | The tweak value to use. Only applicable for FPE transformations. | @@ -928,7 +928,7 @@ public readonly path: string; Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -942,7 +942,7 @@ public readonly roleName: string; The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -958,7 +958,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -972,7 +972,7 @@ public readonly batchResults: IResolvable | {[ key: string ]: string}[]; The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -986,7 +986,7 @@ public readonly decodedValue: string; The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -998,7 +998,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1015,7 +1015,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1031,7 +1031,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1045,7 +1045,7 @@ public readonly tweak: string; The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1059,7 +1059,7 @@ public readonly value: string; The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformEncode.csharp.md b/docs/dataVaultTransformEncode.csharp.md index 6c91a6c9..59f5e47f 100644 --- a/docs/dataVaultTransformEncode.csharp.md +++ b/docs/dataVaultTransformEncode.csharp.md @@ -4,7 +4,7 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -858,7 +858,7 @@ new DataVaultTransformEncodeConfig { | BatchInput | object | Specifies a list of items to be encoded in a single batch. | | BatchResults | object | The result of encoding batch_input. | | EncodedValue | string | The result of encoding a value. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Transformation | string | The transformation to perform. | | Tweak | string | The tweak value to use. Only applicable for FPE transformations. | @@ -946,7 +946,7 @@ public string Path { get; set; } Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -960,7 +960,7 @@ public string RoleName { get; set; } The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -976,7 +976,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -990,7 +990,7 @@ public object BatchResults { get; set; } The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -1004,7 +1004,7 @@ public string EncodedValue { get; set; } The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -1016,7 +1016,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1033,7 +1033,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1049,7 +1049,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1063,7 +1063,7 @@ public string Tweak { get; set; } The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1077,7 +1077,7 @@ public string Value { get; set; } The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransformEncode.go.md b/docs/dataVaultTransformEncode.go.md index 9f4846e7..9fea77c8 100644 --- a/docs/dataVaultTransformEncode.go.md +++ b/docs/dataVaultTransformEncode.go.md @@ -4,12 +4,12 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformencode" datavaulttransformencode.NewDataVaultTransformEncode(scope Construct, id *string, config DataVaultTransformEncodeConfig) DataVaultTransformEncode ``` @@ -332,7 +332,7 @@ func ResetValue() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformencode" datavaulttransformencode.DataVaultTransformEncode_IsConstruct(x interface{}) *bool ``` @@ -364,7 +364,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformencode" datavaulttransformencode.DataVaultTransformEncode_IsTerraformElement(x interface{}) *bool ``` @@ -378,7 +378,7 @@ datavaulttransformencode.DataVaultTransformEncode_IsTerraformElement(x interface ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformencode" datavaulttransformencode.DataVaultTransformEncode_IsTerraformDataSource(x interface{}) *bool ``` @@ -392,7 +392,7 @@ datavaulttransformencode.DataVaultTransformEncode_IsTerraformDataSource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformencode" datavaulttransformencode.DataVaultTransformEncode_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -819,7 +819,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformencode" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformencode" &datavaulttransformencode.DataVaultTransformEncodeConfig { Connection: interface{}, @@ -858,7 +858,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransformenc | BatchInput | interface{} | Specifies a list of items to be encoded in a single batch. | | BatchResults | interface{} | The result of encoding batch_input. | | EncodedValue | *string | The result of encoding a value. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Transformation | *string | The transformation to perform. | | Tweak | *string | The tweak value to use. Only applicable for FPE transformations. | @@ -946,7 +946,7 @@ Path *string Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -960,7 +960,7 @@ RoleName *string The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -976,7 +976,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -990,7 +990,7 @@ BatchResults interface{} The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -1004,7 +1004,7 @@ EncodedValue *string The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -1016,7 +1016,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1033,7 +1033,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1049,7 +1049,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1063,7 +1063,7 @@ Tweak *string The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1077,7 +1077,7 @@ Value *string The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransformEncode.java.md b/docs/dataVaultTransformEncode.java.md index ccc06ae2..3ec838c8 100644 --- a/docs/dataVaultTransformEncode.java.md +++ b/docs/dataVaultTransformEncode.java.md @@ -4,7 +4,7 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers @@ -54,7 +54,7 @@ DataVaultTransformEncode.Builder.create(Construct scope, java.lang.String id) | batchInput | com.hashicorp.cdktf.IResolvable OR java.util.List> | Specifies a list of items to be encoded in a single batch. | | batchResults | com.hashicorp.cdktf.IResolvable OR java.util.List> | The result of encoding batch_input. | | encodedValue | java.lang.String | The result of encoding a value. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformation | java.lang.String | The transformation to perform. | | tweak | java.lang.String | The tweak value to use. Only applicable for FPE transformations. | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -150,7 +150,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -203,7 +203,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- @@ -602,7 +602,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -1045,7 +1045,7 @@ DataVaultTransformEncodeConfig.builder() | batchInput | com.hashicorp.cdktf.IResolvable OR java.util.List> | Specifies a list of items to be encoded in a single batch. | | batchResults | com.hashicorp.cdktf.IResolvable OR java.util.List> | The result of encoding batch_input. | | encodedValue | java.lang.String | The result of encoding a value. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformation | java.lang.String | The transformation to perform. | | tweak | java.lang.String | The tweak value to use. Only applicable for FPE transformations. | @@ -1133,7 +1133,7 @@ public java.lang.String getPath(); Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -1147,7 +1147,7 @@ public java.lang.String getRoleName(); The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -1163,7 +1163,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -1177,7 +1177,7 @@ public java.lang.Object getBatchResults(); The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -1191,7 +1191,7 @@ public java.lang.String getEncodedValue(); The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -1203,7 +1203,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1220,7 +1220,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1236,7 +1236,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1250,7 +1250,7 @@ public java.lang.String getTweak(); The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1264,7 +1264,7 @@ public java.lang.String getValue(); The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransformEncode.python.md b/docs/dataVaultTransformEncode.python.md index cd2d380a..9f2d5489 100644 --- a/docs/dataVaultTransformEncode.python.md +++ b/docs/dataVaultTransformEncode.python.md @@ -4,7 +4,7 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers @@ -50,7 +50,7 @@ dataVaultTransformEncode.DataVaultTransformEncode( | batch_input | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | Specifies a list of items to be encoded in a single batch. | | batch_results | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | The result of encoding batch_input. | | encoded_value | str | The result of encoding a value. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformation | str | The transformation to perform. | | tweak | str | The tweak value to use. Only applicable for FPE transformations. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -146,7 +146,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -199,7 +199,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- @@ -634,7 +634,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -1071,7 +1071,7 @@ dataVaultTransformEncode.DataVaultTransformEncodeConfig( | batch_input | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | Specifies a list of items to be encoded in a single batch. | | batch_results | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | The result of encoding batch_input. | | encoded_value | str | The result of encoding a value. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformation | str | The transformation to perform. | | tweak | str | The tweak value to use. Only applicable for FPE transformations. | @@ -1159,7 +1159,7 @@ path: str Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -1173,7 +1173,7 @@ role_name: str The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -1189,7 +1189,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -1203,7 +1203,7 @@ batch_results: typing.Union[IResolvable, typing.List[typing.Mapping[str]]] The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -1217,7 +1217,7 @@ encoded_value: str The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -1229,7 +1229,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1246,7 +1246,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1262,7 +1262,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1276,7 +1276,7 @@ tweak: str The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1290,7 +1290,7 @@ value: str The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransformEncode.typescript.md b/docs/dataVaultTransformEncode.typescript.md index 65242d33..4207af57 100644 --- a/docs/dataVaultTransformEncode.typescript.md +++ b/docs/dataVaultTransformEncode.typescript.md @@ -4,7 +4,7 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -840,7 +840,7 @@ const dataVaultTransformEncodeConfig: dataVaultTransformEncode.DataVaultTransfor | batchInput | cdktf.IResolvable \| {[ key: string ]: string}[] | Specifies a list of items to be encoded in a single batch. | | batchResults | cdktf.IResolvable \| {[ key: string ]: string}[] | The result of encoding batch_input. | | encodedValue | string | The result of encoding a value. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | string | Target namespace. (requires Enterprise). | | transformation | string | The transformation to perform. | | tweak | string | The tweak value to use. Only applicable for FPE transformations. | @@ -928,7 +928,7 @@ public readonly path: string; Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -942,7 +942,7 @@ public readonly roleName: string; The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -958,7 +958,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -972,7 +972,7 @@ public readonly batchResults: IResolvable | {[ key: string ]: string}[]; The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -986,7 +986,7 @@ public readonly encodedValue: string; The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -998,7 +998,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1015,7 +1015,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1031,7 +1031,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1045,7 +1045,7 @@ public readonly tweak: string; The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1059,7 +1059,7 @@ public readonly value: string; The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransitDecrypt.csharp.md b/docs/dataVaultTransitDecrypt.csharp.md index 228790d9..3571b814 100644 --- a/docs/dataVaultTransitDecrypt.csharp.md +++ b/docs/dataVaultTransitDecrypt.csharp.md @@ -4,7 +4,7 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -741,7 +741,7 @@ new DataVaultTransitDecryptConfig { | Ciphertext | string | Transit encrypted cipher text. | | Key | string | Name of the decryption key to use. | | Context | string | Specifies the context for key derivation. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -826,7 +826,7 @@ public string Backend { get; set; } The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -840,7 +840,7 @@ public string Ciphertext { get; set; } Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -854,7 +854,7 @@ public string Key { get; set; } Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -868,7 +868,7 @@ public string Context { get; set; } Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -880,7 +880,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -897,7 +897,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitDecrypt.go.md b/docs/dataVaultTransitDecrypt.go.md index 036e1820..09dfb102 100644 --- a/docs/dataVaultTransitDecrypt.go.md +++ b/docs/dataVaultTransitDecrypt.go.md @@ -4,12 +4,12 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitdecrypt" datavaulttransitdecrypt.NewDataVaultTransitDecrypt(scope Construct, id *string, config DataVaultTransitDecryptConfig) DataVaultTransitDecrypt ``` @@ -297,7 +297,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitdecrypt" datavaulttransitdecrypt.DataVaultTransitDecrypt_IsConstruct(x interface{}) *bool ``` @@ -329,7 +329,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitdecrypt" datavaulttransitdecrypt.DataVaultTransitDecrypt_IsTerraformElement(x interface{}) *bool ``` @@ -343,7 +343,7 @@ datavaulttransitdecrypt.DataVaultTransitDecrypt_IsTerraformElement(x interface{} ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitdecrypt" datavaulttransitdecrypt.DataVaultTransitDecrypt_IsTerraformDataSource(x interface{}) *bool ``` @@ -357,7 +357,7 @@ datavaulttransitdecrypt.DataVaultTransitDecrypt_IsTerraformDataSource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitdecrypt" datavaulttransitdecrypt.DataVaultTransitDecrypt_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -707,7 +707,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitdecrypt" &datavaulttransitdecrypt.DataVaultTransitDecryptConfig { Connection: interface{}, @@ -741,7 +741,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitdecry | Ciphertext | *string | Transit encrypted cipher text. | | Key | *string | Name of the decryption key to use. | | Context | *string | Specifies the context for key derivation. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -826,7 +826,7 @@ Backend *string The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -840,7 +840,7 @@ Ciphertext *string Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -854,7 +854,7 @@ Key *string Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -868,7 +868,7 @@ Context *string Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -880,7 +880,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -897,7 +897,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitDecrypt.java.md b/docs/dataVaultTransitDecrypt.java.md index 1e322a2b..7f891e53 100644 --- a/docs/dataVaultTransitDecrypt.java.md +++ b/docs/dataVaultTransitDecrypt.java.md @@ -4,7 +4,7 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers @@ -47,7 +47,7 @@ DataVaultTransitDecrypt.Builder.create(Construct scope, java.lang.String id) | ciphertext | java.lang.String | Transit encrypted cipher text. | | key | java.lang.String | Name of the decryption key to use. | | context | java.lang.String | Specifies the context for key derivation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- @@ -513,7 +513,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -872,7 +872,7 @@ DataVaultTransitDecryptConfig.builder() | ciphertext | java.lang.String | Transit encrypted cipher text. | | key | java.lang.String | Name of the decryption key to use. | | context | java.lang.String | Specifies the context for key derivation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -957,7 +957,7 @@ public java.lang.String getBackend(); The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -971,7 +971,7 @@ public java.lang.String getCiphertext(); Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -985,7 +985,7 @@ public java.lang.String getKey(); Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -999,7 +999,7 @@ public java.lang.String getContext(); Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -1011,7 +1011,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitDecrypt.python.md b/docs/dataVaultTransitDecrypt.python.md index 837f03bf..d93c356f 100644 --- a/docs/dataVaultTransitDecrypt.python.md +++ b/docs/dataVaultTransitDecrypt.python.md @@ -4,7 +4,7 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers @@ -45,7 +45,7 @@ dataVaultTransitDecrypt.DataVaultTransitDecrypt( | ciphertext | str | Transit encrypted cipher text. | | key | str | Name of the decryption key to use. | | context | str | Specifies the context for key derivation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- @@ -547,7 +547,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -902,7 +902,7 @@ dataVaultTransitDecrypt.DataVaultTransitDecryptConfig( | ciphertext | str | Transit encrypted cipher text. | | key | str | Name of the decryption key to use. | | context | str | Specifies the context for key derivation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -987,7 +987,7 @@ backend: str The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -1001,7 +1001,7 @@ ciphertext: str Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -1015,7 +1015,7 @@ key: str Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -1029,7 +1029,7 @@ context: str Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -1041,7 +1041,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1058,7 +1058,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitDecrypt.typescript.md b/docs/dataVaultTransitDecrypt.typescript.md index e3627606..101a7296 100644 --- a/docs/dataVaultTransitDecrypt.typescript.md +++ b/docs/dataVaultTransitDecrypt.typescript.md @@ -4,7 +4,7 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -727,7 +727,7 @@ const dataVaultTransitDecryptConfig: dataVaultTransitDecrypt.DataVaultTransitDec | ciphertext | string | Transit encrypted cipher text. | | key | string | Name of the decryption key to use. | | context | string | Specifies the context for key derivation. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -812,7 +812,7 @@ public readonly backend: string; The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -826,7 +826,7 @@ public readonly ciphertext: string; Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -840,7 +840,7 @@ public readonly key: string; Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -854,7 +854,7 @@ public readonly context: string; Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -866,7 +866,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -883,7 +883,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.csharp.md b/docs/dataVaultTransitEncrypt.csharp.md index bdb15d88..22c299d8 100644 --- a/docs/dataVaultTransitEncrypt.csharp.md +++ b/docs/dataVaultTransitEncrypt.csharp.md @@ -4,7 +4,7 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -771,7 +771,7 @@ new DataVaultTransitEncryptConfig { | Key | string | Name of the encryption key to use. | | Plaintext | string | Map of strings read from Vault. | | Context | string | Specifies the context for key derivation. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | KeyVersion | double | The version of the key to use for encryption. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -857,7 +857,7 @@ public string Backend { get; set; } The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -871,7 +871,7 @@ public string Key { get; set; } Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -885,7 +885,7 @@ public string Plaintext { get; set; } Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -899,7 +899,7 @@ public string Context { get; set; } Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -911,7 +911,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -928,7 +928,7 @@ public double KeyVersion { get; set; } The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -942,7 +942,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.go.md b/docs/dataVaultTransitEncrypt.go.md index acdb43ce..6f485172 100644 --- a/docs/dataVaultTransitEncrypt.go.md +++ b/docs/dataVaultTransitEncrypt.go.md @@ -4,12 +4,12 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitencrypt" datavaulttransitencrypt.NewDataVaultTransitEncrypt(scope Construct, id *string, config DataVaultTransitEncryptConfig) DataVaultTransitEncrypt ``` @@ -304,7 +304,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitencrypt" datavaulttransitencrypt.DataVaultTransitEncrypt_IsConstruct(x interface{}) *bool ``` @@ -336,7 +336,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitencrypt" datavaulttransitencrypt.DataVaultTransitEncrypt_IsTerraformElement(x interface{}) *bool ``` @@ -350,7 +350,7 @@ datavaulttransitencrypt.DataVaultTransitEncrypt_IsTerraformElement(x interface{} ##### `IsTerraformDataSource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitencrypt" datavaulttransitencrypt.DataVaultTransitEncrypt_IsTerraformDataSource(x interface{}) *bool ``` @@ -364,7 +364,7 @@ datavaulttransitencrypt.DataVaultTransitEncrypt_IsTerraformDataSource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitencrypt" datavaulttransitencrypt.DataVaultTransitEncrypt_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -736,7 +736,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencrypt" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitencrypt" &datavaulttransitencrypt.DataVaultTransitEncryptConfig { Connection: interface{}, @@ -771,7 +771,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/datavaulttransitencry | Key | *string | Name of the encryption key to use. | | Plaintext | *string | Map of strings read from Vault. | | Context | *string | Specifies the context for key derivation. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | KeyVersion | *f64 | The version of the key to use for encryption. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -857,7 +857,7 @@ Backend *string The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -871,7 +871,7 @@ Key *string Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -885,7 +885,7 @@ Plaintext *string Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -899,7 +899,7 @@ Context *string Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -911,7 +911,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -928,7 +928,7 @@ KeyVersion *f64 The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -942,7 +942,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.java.md b/docs/dataVaultTransitEncrypt.java.md index d5272813..1aee84ea 100644 --- a/docs/dataVaultTransitEncrypt.java.md +++ b/docs/dataVaultTransitEncrypt.java.md @@ -4,7 +4,7 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers @@ -48,7 +48,7 @@ DataVaultTransitEncrypt.Builder.create(Construct scope, java.lang.String id) | key | java.lang.String | Name of the encryption key to use. | | plaintext | java.lang.String | Map of strings read from Vault. | | context | java.lang.String | Specifies the context for key derivation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | keyVersion | java.lang.Number | The version of the key to use for encryption. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- @@ -532,7 +532,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ DataVaultTransitEncryptConfig.builder() | key | java.lang.String | Name of the encryption key to use. | | plaintext | java.lang.String | Map of strings read from Vault. | | context | java.lang.String | Specifies the context for key derivation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | keyVersion | java.lang.Number | The version of the key to use for encryption. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1000,7 +1000,7 @@ public java.lang.String getBackend(); The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -1014,7 +1014,7 @@ public java.lang.String getKey(); Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -1028,7 +1028,7 @@ public java.lang.String getPlaintext(); Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -1042,7 +1042,7 @@ public java.lang.String getContext(); Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -1054,7 +1054,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1071,7 +1071,7 @@ public java.lang.Number getKeyVersion(); The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -1085,7 +1085,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.python.md b/docs/dataVaultTransitEncrypt.python.md index 62a78a07..5b172b75 100644 --- a/docs/dataVaultTransitEncrypt.python.md +++ b/docs/dataVaultTransitEncrypt.python.md @@ -4,7 +4,7 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers @@ -46,7 +46,7 @@ dataVaultTransitEncrypt.DataVaultTransitEncrypt( | key | str | Name of the encryption key to use. | | plaintext | str | Map of strings read from Vault. | | context | str | Specifies the context for key derivation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | key_version | typing.Union[int, float] | The version of the key to use for encryption. | | namespace | str | Target namespace. (requires Enterprise). | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- @@ -566,7 +566,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -944,7 +944,7 @@ dataVaultTransitEncrypt.DataVaultTransitEncryptConfig( | key | str | Name of the encryption key to use. | | plaintext | str | Map of strings read from Vault. | | context | str | Specifies the context for key derivation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | key_version | typing.Union[int, float] | The version of the key to use for encryption. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1030,7 +1030,7 @@ backend: str The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -1044,7 +1044,7 @@ key: str Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -1058,7 +1058,7 @@ plaintext: str Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -1072,7 +1072,7 @@ context: str Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -1084,7 +1084,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1101,7 +1101,7 @@ key_version: typing.Union[int, float] The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -1115,7 +1115,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.typescript.md b/docs/dataVaultTransitEncrypt.typescript.md index 90f7bddd..b35bc153 100644 --- a/docs/dataVaultTransitEncrypt.typescript.md +++ b/docs/dataVaultTransitEncrypt.typescript.md @@ -4,7 +4,7 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -756,7 +756,7 @@ const dataVaultTransitEncryptConfig: dataVaultTransitEncrypt.DataVaultTransitEnc | key | string | Name of the encryption key to use. | | plaintext | string | Map of strings read from Vault. | | context | string | Specifies the context for key derivation. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | keyVersion | number | The version of the key to use for encryption. | | namespace | string | Target namespace. (requires Enterprise). | @@ -842,7 +842,7 @@ public readonly backend: string; The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -856,7 +856,7 @@ public readonly key: string; Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -870,7 +870,7 @@ public readonly plaintext: string; Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -884,7 +884,7 @@ public readonly context: string; Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -896,7 +896,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -913,7 +913,7 @@ public readonly keyVersion: number; The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -927,7 +927,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/databaseSecretBackendConnection.csharp.md b/docs/databaseSecretBackendConnection.csharp.md index a5287a8d..a8b5325e 100644 --- a/docs/databaseSecretBackendConnection.csharp.md +++ b/docs/databaseSecretBackendConnection.csharp.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers @@ -876,7 +876,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -1713,7 +1713,7 @@ public double ConnectTimeout { get; set; } The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -1727,7 +1727,7 @@ public string[] Hosts { get; set; } Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -1741,7 +1741,7 @@ public object InsecureTls { get; set; } Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1755,7 +1755,7 @@ public string Password { get; set; } The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1771,7 +1771,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -1787,7 +1787,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -1801,7 +1801,7 @@ public double Port { get; set; } The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -1815,7 +1815,7 @@ public double ProtocolVersion { get; set; } The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} --- @@ -1829,7 +1829,7 @@ public object Tls { get; set; } Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1843,7 +1843,7 @@ public string Username { get; set; } The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1911,7 +1911,7 @@ new DatabaseSecretBackendConnectionConfig { | Data | System.Collections.Generic.IDictionary | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | Elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | Hana | DatabaseSecretBackendConnectionHana | hana block. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | Influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | Mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | Mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -2013,7 +2013,7 @@ public string Backend { get; set; } Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -2027,7 +2027,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -2041,7 +2041,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -2055,7 +2055,7 @@ public DatabaseSecretBackendConnectionCassandra Cassandra { get; set; } cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -2069,7 +2069,7 @@ public DatabaseSecretBackendConnectionCouchbase Couchbase { get; set; } couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -2083,7 +2083,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -2097,7 +2097,7 @@ public DatabaseSecretBackendConnectionElasticsearch Elasticsearch { get; set; } elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -2111,7 +2111,7 @@ public DatabaseSecretBackendConnectionHana Hana { get; set; } hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -2123,7 +2123,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2140,7 +2140,7 @@ public DatabaseSecretBackendConnectionInfluxdb Influxdb { get; set; } influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -2154,7 +2154,7 @@ public DatabaseSecretBackendConnectionMongodb Mongodb { get; set; } mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -2168,7 +2168,7 @@ public DatabaseSecretBackendConnectionMongodbatlas Mongodbatlas { get; set; } mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -2182,7 +2182,7 @@ public DatabaseSecretBackendConnectionMssql Mssql { get; set; } mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -2196,7 +2196,7 @@ public DatabaseSecretBackendConnectionMysql Mysql { get; set; } mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -2210,7 +2210,7 @@ public DatabaseSecretBackendConnectionMysqlAurora MysqlAurora { get; set; } mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -2224,7 +2224,7 @@ public DatabaseSecretBackendConnectionMysqlLegacy MysqlLegacy { get; set; } mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -2238,7 +2238,7 @@ public DatabaseSecretBackendConnectionMysqlRds MysqlRds { get; set; } mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -2252,7 +2252,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -2266,7 +2266,7 @@ public DatabaseSecretBackendConnectionOracle Oracle { get; set; } oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -2282,7 +2282,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -2296,7 +2296,7 @@ public DatabaseSecretBackendConnectionPostgresql Postgresql { get; set; } postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -2310,7 +2310,7 @@ public DatabaseSecretBackendConnectionRedis Redis { get; set; } redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -2324,7 +2324,7 @@ public DatabaseSecretBackendConnectionRedisElasticache RedisElasticache { get; s redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -2338,7 +2338,7 @@ public DatabaseSecretBackendConnectionRedshift Redshift { get; set; } redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -2352,7 +2352,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -2366,7 +2366,7 @@ public DatabaseSecretBackendConnectionSnowflake Snowflake { get; set; } snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -2380,7 +2380,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -2428,7 +2428,7 @@ public string[] Hosts { get; set; } A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2442,7 +2442,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2456,7 +2456,7 @@ public string Username { get; set; } Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2472,7 +2472,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -2486,7 +2486,7 @@ public string BucketName { get; set; } Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -2500,7 +2500,7 @@ public object InsecureTls { get; set; } Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2514,7 +2514,7 @@ public object Tls { get; set; } Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2528,7 +2528,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2580,7 +2580,7 @@ public string Password { get; set; } The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2594,7 +2594,7 @@ public string Url { get; set; } The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -2608,7 +2608,7 @@ public string Username { get; set; } The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2622,7 +2622,7 @@ public string CaCert { get; set; } The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -2636,7 +2636,7 @@ public string CaPath { get; set; } The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -2650,7 +2650,7 @@ public string ClientCert { get; set; } The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -2664,7 +2664,7 @@ public string ClientKey { get; set; } The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -2678,7 +2678,7 @@ public object Insecure { get; set; } Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -2692,7 +2692,7 @@ public string TlsServerName { get; set; } This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -2706,7 +2706,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2752,7 +2752,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2766,7 +2766,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2780,7 +2780,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2794,7 +2794,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2808,7 +2808,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2822,7 +2822,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2836,7 +2836,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2888,7 +2888,7 @@ public string Host { get; set; } Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -2902,7 +2902,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2916,7 +2916,7 @@ public string Username { get; set; } Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2930,7 +2930,7 @@ public double ConnectTimeout { get; set; } The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -2944,7 +2944,7 @@ public object InsecureTls { get; set; } Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2960,7 +2960,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -2976,7 +2976,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -2990,7 +2990,7 @@ public double Port { get; set; } The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -3004,7 +3004,7 @@ public object Tls { get; set; } Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -3018,7 +3018,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3064,7 +3064,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3078,7 +3078,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3092,7 +3092,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3106,7 +3106,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3120,7 +3120,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3134,7 +3134,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3148,7 +3148,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3186,7 +3186,7 @@ public string PrivateKey { get; set; } The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -3200,7 +3200,7 @@ public string ProjectId { get; set; } The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -3214,7 +3214,7 @@ public string PublicKey { get; set; } The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -3264,7 +3264,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3278,7 +3278,7 @@ public object ContainedDb { get; set; } Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -3292,7 +3292,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3306,7 +3306,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3320,7 +3320,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3334,7 +3334,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3348,7 +3348,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3362,7 +3362,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3376,7 +3376,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3430,7 +3430,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3444,7 +3444,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3458,7 +3458,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3472,7 +3472,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3486,7 +3486,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3500,7 +3500,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3514,7 +3514,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3528,7 +3528,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3544,7 +3544,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3558,7 +3558,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3572,7 +3572,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3626,7 +3626,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3640,7 +3640,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3654,7 +3654,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3668,7 +3668,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3682,7 +3682,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3696,7 +3696,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3710,7 +3710,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3724,7 +3724,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3740,7 +3740,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3754,7 +3754,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3768,7 +3768,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3822,7 +3822,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3836,7 +3836,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3850,7 +3850,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3864,7 +3864,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3878,7 +3878,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3892,7 +3892,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3906,7 +3906,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3920,7 +3920,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3936,7 +3936,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3950,7 +3950,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3964,7 +3964,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4018,7 +4018,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4032,7 +4032,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4046,7 +4046,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4060,7 +4060,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4074,7 +4074,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4088,7 +4088,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4102,7 +4102,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4116,7 +4116,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4132,7 +4132,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4146,7 +4146,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4160,7 +4160,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4210,7 +4210,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4224,7 +4224,7 @@ public object DisconnectSessions { get; set; } Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -4238,7 +4238,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4252,7 +4252,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4266,7 +4266,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4280,7 +4280,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4294,7 +4294,7 @@ public object SplitStatements { get; set; } Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -4308,7 +4308,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4322,7 +4322,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4374,7 +4374,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4388,7 +4388,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4402,7 +4402,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4416,7 +4416,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4430,7 +4430,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4444,7 +4444,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4458,7 +4458,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4472,7 +4472,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4486,7 +4486,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4500,7 +4500,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4546,7 +4546,7 @@ public string Host { get; set; } Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4560,7 +4560,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4574,7 +4574,7 @@ public string Username { get; set; } Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4588,7 +4588,7 @@ public string CaCert { get; set; } The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -4602,7 +4602,7 @@ public object InsecureTls { get; set; } Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -4616,7 +4616,7 @@ public double Port { get; set; } The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -4630,7 +4630,7 @@ public object Tls { get; set; } Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -4670,7 +4670,7 @@ public string Url { get; set; } The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -4686,7 +4686,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4702,7 +4702,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -4718,7 +4718,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4766,7 +4766,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4780,7 +4780,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4794,7 +4794,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4808,7 +4808,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4822,7 +4822,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4836,7 +4836,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4850,7 +4850,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4864,7 +4864,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4910,7 +4910,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4924,7 +4924,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4938,7 +4938,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4952,7 +4952,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4966,7 +4966,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4980,7 +4980,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4994,7 +4994,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- diff --git a/docs/databaseSecretBackendConnection.go.md b/docs/databaseSecretBackendConnection.go.md index 4d86122a..139ed9eb 100644 --- a/docs/databaseSecretBackendConnection.go.md +++ b/docs/databaseSecretBackendConnection.go.md @@ -4,12 +4,12 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnection(scope Construct, id *string, config DatabaseSecretBackendConnectionConfig) DatabaseSecretBackendConnection ``` @@ -787,7 +787,7 @@ func ResetVerifyConnection() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.DatabaseSecretBackendConnection_IsConstruct(x interface{}) *bool ``` @@ -819,7 +819,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.DatabaseSecretBackendConnection_IsTerraformElement(x interface{}) *bool ``` @@ -833,7 +833,7 @@ databasesecretbackendconnection.DatabaseSecretBackendConnection_IsTerraformEleme ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.DatabaseSecretBackendConnection_IsTerraformResource(x interface{}) *bool ``` @@ -847,7 +847,7 @@ databasesecretbackendconnection.DatabaseSecretBackendConnection_IsTerraformResou ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.DatabaseSecretBackendConnection_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -876,7 +876,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -1670,7 +1670,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionCassandra { ConnectTimeout: *f64, @@ -1713,7 +1713,7 @@ ConnectTimeout *f64 The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -1727,7 +1727,7 @@ Hosts *[]*string Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -1741,7 +1741,7 @@ InsecureTls interface{} Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1755,7 +1755,7 @@ Password *string The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1771,7 +1771,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -1787,7 +1787,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -1801,7 +1801,7 @@ Port *f64 The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -1815,7 +1815,7 @@ ProtocolVersion *f64 The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} --- @@ -1829,7 +1829,7 @@ Tls interface{} Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1843,7 +1843,7 @@ Username *string The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1852,7 +1852,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionConfig { Connection: interface{}, @@ -1865,29 +1865,29 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackend Backend: *string, Name: *string, AllowedRoles: *[]*string, - Cassandra: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionCassandra, - Couchbase: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionCouchbase, + Cassandra: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionCassandra, + Couchbase: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionCouchbase, Data: *map[string]*string, - Elasticsearch: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionElasticsearch, - Hana: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionHana, + Elasticsearch: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionElasticsearch, + Hana: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionHana, Id: *string, - Influxdb: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionInfluxdb, - Mongodb: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMongodb, - Mongodbatlas: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMongodbatlas, - Mssql: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMssql, - Mysql: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysql, - MysqlAurora: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlAurora, - MysqlLegacy: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlLegacy, - MysqlRds: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlRds, + Influxdb: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionInfluxdb, + Mongodb: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMongodb, + Mongodbatlas: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMongodbatlas, + Mssql: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMssql, + Mysql: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysql, + MysqlAurora: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlAurora, + MysqlLegacy: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlLegacy, + MysqlRds: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionMysqlRds, Namespace: *string, - Oracle: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionOracle, + Oracle: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionOracle, PluginName: *string, - Postgresql: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionPostgresql, - Redis: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedis, - RedisElasticache: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedisElasticache, - Redshift: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedshift, + Postgresql: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionPostgresql, + Redis: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedis, + RedisElasticache: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedisElasticache, + Redshift: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionRedshift, RootRotationStatements: *[]*string, - Snowflake: github.com/cdktf/cdktf-provider-vault-go/vault/v12.databaseSecretBackendConnection.DatabaseSecretBackendConnectionSnowflake, + Snowflake: github.com/cdktf/cdktf-provider-vault-go/vault/v13.databaseSecretBackendConnection.DatabaseSecretBackendConnectionSnowflake, VerifyConnection: interface{}, } ``` @@ -1911,7 +1911,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackend | Data | *map[string]*string | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | Elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | Hana | DatabaseSecretBackendConnectionHana | hana block. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | Influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | Mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | Mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -2013,7 +2013,7 @@ Backend *string Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -2027,7 +2027,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -2041,7 +2041,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -2055,7 +2055,7 @@ Cassandra DatabaseSecretBackendConnectionCassandra cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -2069,7 +2069,7 @@ Couchbase DatabaseSecretBackendConnectionCouchbase couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -2083,7 +2083,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -2097,7 +2097,7 @@ Elasticsearch DatabaseSecretBackendConnectionElasticsearch elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -2111,7 +2111,7 @@ Hana DatabaseSecretBackendConnectionHana hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -2123,7 +2123,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2140,7 +2140,7 @@ Influxdb DatabaseSecretBackendConnectionInfluxdb influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -2154,7 +2154,7 @@ Mongodb DatabaseSecretBackendConnectionMongodb mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -2168,7 +2168,7 @@ Mongodbatlas DatabaseSecretBackendConnectionMongodbatlas mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -2182,7 +2182,7 @@ Mssql DatabaseSecretBackendConnectionMssql mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -2196,7 +2196,7 @@ Mysql DatabaseSecretBackendConnectionMysql mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -2210,7 +2210,7 @@ MysqlAurora DatabaseSecretBackendConnectionMysqlAurora mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -2224,7 +2224,7 @@ MysqlLegacy DatabaseSecretBackendConnectionMysqlLegacy mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -2238,7 +2238,7 @@ MysqlRds DatabaseSecretBackendConnectionMysqlRds mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -2252,7 +2252,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -2266,7 +2266,7 @@ Oracle DatabaseSecretBackendConnectionOracle oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -2282,7 +2282,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -2296,7 +2296,7 @@ Postgresql DatabaseSecretBackendConnectionPostgresql postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -2310,7 +2310,7 @@ Redis DatabaseSecretBackendConnectionRedis redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -2324,7 +2324,7 @@ RedisElasticache DatabaseSecretBackendConnectionRedisElasticache redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -2338,7 +2338,7 @@ Redshift DatabaseSecretBackendConnectionRedshift redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -2352,7 +2352,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -2366,7 +2366,7 @@ Snowflake DatabaseSecretBackendConnectionSnowflake snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -2380,7 +2380,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -2389,7 +2389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionCouchbase { Hosts: *[]*string, @@ -2428,7 +2428,7 @@ Hosts *[]*string A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2442,7 +2442,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2456,7 +2456,7 @@ Username *string Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2472,7 +2472,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -2486,7 +2486,7 @@ BucketName *string Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -2500,7 +2500,7 @@ InsecureTls interface{} Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2514,7 +2514,7 @@ Tls interface{} Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2528,7 +2528,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2537,7 +2537,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionElasticsearch { Password: *string, @@ -2580,7 +2580,7 @@ Password *string The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2594,7 +2594,7 @@ Url *string The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -2608,7 +2608,7 @@ Username *string The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2622,7 +2622,7 @@ CaCert *string The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -2636,7 +2636,7 @@ CaPath *string The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -2650,7 +2650,7 @@ ClientCert *string The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -2664,7 +2664,7 @@ ClientKey *string The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -2678,7 +2678,7 @@ Insecure interface{} Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -2692,7 +2692,7 @@ TlsServerName *string This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -2706,7 +2706,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2715,7 +2715,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionHana { ConnectionUrl: *string, @@ -2752,7 +2752,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2766,7 +2766,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2780,7 +2780,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2794,7 +2794,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2808,7 +2808,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2822,7 +2822,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2836,7 +2836,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2845,7 +2845,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionInfluxdb { Host: *string, @@ -2888,7 +2888,7 @@ Host *string Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -2902,7 +2902,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2916,7 +2916,7 @@ Username *string Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2930,7 +2930,7 @@ ConnectTimeout *f64 The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -2944,7 +2944,7 @@ InsecureTls interface{} Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2960,7 +2960,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -2976,7 +2976,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -2990,7 +2990,7 @@ Port *f64 The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -3004,7 +3004,7 @@ Tls interface{} Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -3018,7 +3018,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3027,7 +3027,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMongodb { ConnectionUrl: *string, @@ -3064,7 +3064,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3078,7 +3078,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3092,7 +3092,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3106,7 +3106,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3120,7 +3120,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3134,7 +3134,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3148,7 +3148,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3157,7 +3157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMongodbatlas { PrivateKey: *string, @@ -3186,7 +3186,7 @@ PrivateKey *string The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -3200,7 +3200,7 @@ ProjectId *string The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -3214,7 +3214,7 @@ PublicKey *string The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -3223,7 +3223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMssql { ConnectionUrl: *string, @@ -3264,7 +3264,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3278,7 +3278,7 @@ ContainedDb interface{} Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -3292,7 +3292,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3306,7 +3306,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3320,7 +3320,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3334,7 +3334,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3348,7 +3348,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3362,7 +3362,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3376,7 +3376,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3385,7 +3385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMysql { AuthType: *string, @@ -3430,7 +3430,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3444,7 +3444,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3458,7 +3458,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3472,7 +3472,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3486,7 +3486,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3500,7 +3500,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3514,7 +3514,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3528,7 +3528,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3544,7 +3544,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3558,7 +3558,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3572,7 +3572,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3581,7 +3581,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMysqlAurora { AuthType: *string, @@ -3626,7 +3626,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3640,7 +3640,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3654,7 +3654,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3668,7 +3668,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3682,7 +3682,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3696,7 +3696,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3710,7 +3710,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3724,7 +3724,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3740,7 +3740,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3754,7 +3754,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3768,7 +3768,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3777,7 +3777,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMysqlLegacy { AuthType: *string, @@ -3822,7 +3822,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3836,7 +3836,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3850,7 +3850,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3864,7 +3864,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3878,7 +3878,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3892,7 +3892,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3906,7 +3906,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3920,7 +3920,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3936,7 +3936,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3950,7 +3950,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3964,7 +3964,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3973,7 +3973,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionMysqlRds { AuthType: *string, @@ -4018,7 +4018,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4032,7 +4032,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4046,7 +4046,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4060,7 +4060,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4074,7 +4074,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4088,7 +4088,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4102,7 +4102,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4116,7 +4116,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4132,7 +4132,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4146,7 +4146,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4160,7 +4160,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4169,7 +4169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionOracle { ConnectionUrl: *string, @@ -4210,7 +4210,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4224,7 +4224,7 @@ DisconnectSessions interface{} Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -4238,7 +4238,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4252,7 +4252,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4266,7 +4266,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4280,7 +4280,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4294,7 +4294,7 @@ SplitStatements interface{} Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -4308,7 +4308,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4322,7 +4322,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4331,7 +4331,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionPostgresql { AuthType: *string, @@ -4374,7 +4374,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4388,7 +4388,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4402,7 +4402,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4416,7 +4416,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4430,7 +4430,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4444,7 +4444,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4458,7 +4458,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4472,7 +4472,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4486,7 +4486,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4500,7 +4500,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4509,7 +4509,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionRedis { Host: *string, @@ -4546,7 +4546,7 @@ Host *string Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4560,7 +4560,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4574,7 +4574,7 @@ Username *string Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4588,7 +4588,7 @@ CaCert *string The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -4602,7 +4602,7 @@ InsecureTls interface{} Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -4616,7 +4616,7 @@ Port *f64 The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -4630,7 +4630,7 @@ Tls interface{} Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -4639,7 +4639,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionRedisElasticache { Url: *string, @@ -4670,7 +4670,7 @@ Url *string The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -4686,7 +4686,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4702,7 +4702,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -4718,7 +4718,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4727,7 +4727,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionRedshift { ConnectionUrl: *string, @@ -4766,7 +4766,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4780,7 +4780,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4794,7 +4794,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4808,7 +4808,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4822,7 +4822,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4836,7 +4836,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4850,7 +4850,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4864,7 +4864,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4873,7 +4873,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" &databasesecretbackendconnection.DatabaseSecretBackendConnectionSnowflake { ConnectionUrl: *string, @@ -4910,7 +4910,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4924,7 +4924,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4938,7 +4938,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4952,7 +4952,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4966,7 +4966,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4980,7 +4980,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4994,7 +4994,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5005,7 +5005,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionCassandraOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionCassandraOutputReference ``` @@ -5544,7 +5544,7 @@ func InternalValue() DatabaseSecretBackendConnectionCassandra #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionCouchbaseOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionCouchbaseOutputReference ``` @@ -6004,7 +6004,7 @@ func InternalValue() DatabaseSecretBackendConnectionCouchbase #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionElasticsearchOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionElasticsearchOutputReference ``` @@ -6522,7 +6522,7 @@ func InternalValue() DatabaseSecretBackendConnectionElasticsearch #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionHanaOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionHanaOutputReference ``` @@ -6974,7 +6974,7 @@ func InternalValue() DatabaseSecretBackendConnectionHana #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionInfluxdbOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionInfluxdbOutputReference ``` @@ -7492,7 +7492,7 @@ func InternalValue() DatabaseSecretBackendConnectionInfluxdb #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMongodbatlasOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMongodbatlasOutputReference ``` @@ -7807,7 +7807,7 @@ func InternalValue() DatabaseSecretBackendConnectionMongodbatlas #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMongodbOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMongodbOutputReference ``` @@ -8259,7 +8259,7 @@ func InternalValue() DatabaseSecretBackendConnectionMongodb #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMssqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMssqlOutputReference ``` @@ -8769,7 +8769,7 @@ func InternalValue() DatabaseSecretBackendConnectionMssql #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMysqlAuroraOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMysqlAuroraOutputReference ``` @@ -9337,7 +9337,7 @@ func InternalValue() DatabaseSecretBackendConnectionMysqlAurora #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMysqlLegacyOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMysqlLegacyOutputReference ``` @@ -9905,7 +9905,7 @@ func InternalValue() DatabaseSecretBackendConnectionMysqlLegacy #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMysqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMysqlOutputReference ``` @@ -10473,7 +10473,7 @@ func InternalValue() DatabaseSecretBackendConnectionMysql #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionMysqlRdsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionMysqlRdsOutputReference ``` @@ -11041,7 +11041,7 @@ func InternalValue() DatabaseSecretBackendConnectionMysqlRds #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionOracleOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionOracleOutputReference ``` @@ -11551,7 +11551,7 @@ func InternalValue() DatabaseSecretBackendConnectionOracle #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionPostgresqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionPostgresqlOutputReference ``` @@ -12090,7 +12090,7 @@ func InternalValue() DatabaseSecretBackendConnectionPostgresql #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionRedisElasticacheOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionRedisElasticacheOutputReference ``` @@ -12448,7 +12448,7 @@ func InternalValue() DatabaseSecretBackendConnectionRedisElasticache #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionRedisOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionRedisOutputReference ``` @@ -12879,7 +12879,7 @@ func InternalValue() DatabaseSecretBackendConnectionRedis #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionRedshiftOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionRedshiftOutputReference ``` @@ -13360,7 +13360,7 @@ func InternalValue() DatabaseSecretBackendConnectionRedshift #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendconnection" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendconnection" databasesecretbackendconnection.NewDatabaseSecretBackendConnectionSnowflakeOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) DatabaseSecretBackendConnectionSnowflakeOutputReference ``` diff --git a/docs/databaseSecretBackendConnection.java.md b/docs/databaseSecretBackendConnection.java.md index 89213f8f..3cfd3346 100644 --- a/docs/databaseSecretBackendConnection.java.md +++ b/docs/databaseSecretBackendConnection.java.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers @@ -73,7 +73,7 @@ DatabaseSecretBackendConnection.Builder.create(Construct scope, java.lang.String | data | java.util.Map | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -161,7 +161,7 @@ Must be unique amongst siblings in the same scope Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -252,7 +252,7 @@ If you experience problems setting this value it might not be settable. Please t influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -302,7 +302,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -312,7 +312,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -322,7 +322,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -332,7 +332,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -342,7 +342,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -354,7 +354,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -364,7 +364,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -374,7 +374,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -384,7 +384,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -394,7 +394,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -404,7 +404,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -414,7 +414,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -424,7 +424,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -1260,7 +1260,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -2099,7 +2099,7 @@ public java.lang.Number getConnectTimeout(); The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -2113,7 +2113,7 @@ public java.util.List getHosts(); Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2127,7 +2127,7 @@ public java.lang.Object getInsecureTls(); Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2141,7 +2141,7 @@ public java.lang.String getPassword(); The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2157,7 +2157,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -2173,7 +2173,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -2187,7 +2187,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -2201,7 +2201,7 @@ public java.lang.Number getProtocolVersion(); The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} --- @@ -2215,7 +2215,7 @@ public java.lang.Object getTls(); Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2229,7 +2229,7 @@ public java.lang.String getUsername(); The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2302,7 +2302,7 @@ DatabaseSecretBackendConnectionConfig.builder() | data | java.util.Map | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -2404,7 +2404,7 @@ public java.lang.String getBackend(); Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -2418,7 +2418,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -2432,7 +2432,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -2446,7 +2446,7 @@ public DatabaseSecretBackendConnectionCassandra getCassandra(); cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -2460,7 +2460,7 @@ public DatabaseSecretBackendConnectionCouchbase getCouchbase(); couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -2474,7 +2474,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -2488,7 +2488,7 @@ public DatabaseSecretBackendConnectionElasticsearch getElasticsearch(); elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -2502,7 +2502,7 @@ public DatabaseSecretBackendConnectionHana getHana(); hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -2514,7 +2514,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2531,7 +2531,7 @@ public DatabaseSecretBackendConnectionInfluxdb getInfluxdb(); influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -2545,7 +2545,7 @@ public DatabaseSecretBackendConnectionMongodb getMongodb(); mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -2559,7 +2559,7 @@ public DatabaseSecretBackendConnectionMongodbatlas getMongodbatlas(); mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -2573,7 +2573,7 @@ public DatabaseSecretBackendConnectionMssql getMssql(); mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -2587,7 +2587,7 @@ public DatabaseSecretBackendConnectionMysql getMysql(); mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -2601,7 +2601,7 @@ public DatabaseSecretBackendConnectionMysqlAurora getMysqlAurora(); mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -2615,7 +2615,7 @@ public DatabaseSecretBackendConnectionMysqlLegacy getMysqlLegacy(); mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -2629,7 +2629,7 @@ public DatabaseSecretBackendConnectionMysqlRds getMysqlRds(); mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -2643,7 +2643,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -2657,7 +2657,7 @@ public DatabaseSecretBackendConnectionOracle getOracle(); oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -2673,7 +2673,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -2687,7 +2687,7 @@ public DatabaseSecretBackendConnectionPostgresql getPostgresql(); postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -2701,7 +2701,7 @@ public DatabaseSecretBackendConnectionRedis getRedis(); redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -2715,7 +2715,7 @@ public DatabaseSecretBackendConnectionRedisElasticache getRedisElasticache(); redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -2729,7 +2729,7 @@ public DatabaseSecretBackendConnectionRedshift getRedshift(); redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -2743,7 +2743,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -2757,7 +2757,7 @@ public DatabaseSecretBackendConnectionSnowflake getSnowflake(); snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -2771,7 +2771,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -2821,7 +2821,7 @@ public java.util.List getHosts(); A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2835,7 +2835,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2849,7 +2849,7 @@ public java.lang.String getUsername(); Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2865,7 +2865,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -2879,7 +2879,7 @@ public java.lang.String getBucketName(); Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -2893,7 +2893,7 @@ public java.lang.Object getInsecureTls(); Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2907,7 +2907,7 @@ public java.lang.Object getTls(); Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2921,7 +2921,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2974,7 +2974,7 @@ public java.lang.String getPassword(); The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2988,7 +2988,7 @@ public java.lang.String getUrl(); The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -3002,7 +3002,7 @@ public java.lang.String getUsername(); The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3016,7 +3016,7 @@ public java.lang.String getCaCert(); The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -3030,7 +3030,7 @@ public java.lang.String getCaPath(); The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -3044,7 +3044,7 @@ public java.lang.String getClientCert(); The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -3058,7 +3058,7 @@ public java.lang.String getClientKey(); The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -3072,7 +3072,7 @@ public java.lang.Object getInsecure(); Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -3086,7 +3086,7 @@ public java.lang.String getTlsServerName(); This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -3100,7 +3100,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3147,7 +3147,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3161,7 +3161,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3175,7 +3175,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3189,7 +3189,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3203,7 +3203,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3217,7 +3217,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3231,7 +3231,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3285,7 +3285,7 @@ public java.lang.String getHost(); Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -3299,7 +3299,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3313,7 +3313,7 @@ public java.lang.String getUsername(); Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3327,7 +3327,7 @@ public java.lang.Number getConnectTimeout(); The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -3341,7 +3341,7 @@ public java.lang.Object getInsecureTls(); Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -3357,7 +3357,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -3373,7 +3373,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -3387,7 +3387,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -3401,7 +3401,7 @@ public java.lang.Object getTls(); Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -3415,7 +3415,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3461,7 +3461,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3475,7 +3475,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3489,7 +3489,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3503,7 +3503,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3517,7 +3517,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3531,7 +3531,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3545,7 +3545,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3583,7 +3583,7 @@ public java.lang.String getPrivateKey(); The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -3597,7 +3597,7 @@ public java.lang.String getProjectId(); The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -3611,7 +3611,7 @@ public java.lang.String getPublicKey(); The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -3663,7 +3663,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3677,7 +3677,7 @@ public java.lang.Object getContainedDb(); Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -3691,7 +3691,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3705,7 +3705,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3719,7 +3719,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3733,7 +3733,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3747,7 +3747,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3761,7 +3761,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3775,7 +3775,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3829,7 +3829,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3843,7 +3843,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3857,7 +3857,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3871,7 +3871,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3885,7 +3885,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3899,7 +3899,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3913,7 +3913,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3927,7 +3927,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3943,7 +3943,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3957,7 +3957,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3971,7 +3971,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4025,7 +4025,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4039,7 +4039,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4053,7 +4053,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4067,7 +4067,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4081,7 +4081,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4095,7 +4095,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4109,7 +4109,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4123,7 +4123,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4139,7 +4139,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4153,7 +4153,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4167,7 +4167,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4221,7 +4221,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4235,7 +4235,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4249,7 +4249,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4263,7 +4263,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4277,7 +4277,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4291,7 +4291,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4305,7 +4305,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4319,7 +4319,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4335,7 +4335,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4349,7 +4349,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4363,7 +4363,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4417,7 +4417,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4431,7 +4431,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4445,7 +4445,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4459,7 +4459,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4473,7 +4473,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4487,7 +4487,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4501,7 +4501,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4515,7 +4515,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4531,7 +4531,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4545,7 +4545,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4559,7 +4559,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4611,7 +4611,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4625,7 +4625,7 @@ public java.lang.Object getDisconnectSessions(); Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -4639,7 +4639,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4653,7 +4653,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4667,7 +4667,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4681,7 +4681,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4695,7 +4695,7 @@ public java.lang.Object getSplitStatements(); Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -4709,7 +4709,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4723,7 +4723,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4776,7 +4776,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4790,7 +4790,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4804,7 +4804,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4818,7 +4818,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4832,7 +4832,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4846,7 +4846,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4860,7 +4860,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4874,7 +4874,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4888,7 +4888,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4902,7 +4902,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4950,7 +4950,7 @@ public java.lang.String getHost(); Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4964,7 +4964,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4978,7 +4978,7 @@ public java.lang.String getUsername(); Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4992,7 +4992,7 @@ public java.lang.String getCaCert(); The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -5006,7 +5006,7 @@ public java.lang.Object getInsecureTls(); Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -5020,7 +5020,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -5034,7 +5034,7 @@ public java.lang.Object getTls(); Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -5074,7 +5074,7 @@ public java.lang.String getUrl(); The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -5090,7 +5090,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5106,7 +5106,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -5122,7 +5122,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5171,7 +5171,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5185,7 +5185,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -5199,7 +5199,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5213,7 +5213,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5227,7 +5227,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5241,7 +5241,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5255,7 +5255,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5269,7 +5269,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5315,7 +5315,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5329,7 +5329,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5343,7 +5343,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5357,7 +5357,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5371,7 +5371,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5385,7 +5385,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5399,7 +5399,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- diff --git a/docs/databaseSecretBackendConnection.python.md b/docs/databaseSecretBackendConnection.python.md index f07a84ed..9923644b 100644 --- a/docs/databaseSecretBackendConnection.python.md +++ b/docs/databaseSecretBackendConnection.python.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers @@ -70,7 +70,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnection( | data | typing.Mapping[str] | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -158,7 +158,7 @@ Must be unique amongst siblings in the same scope Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -249,7 +249,7 @@ If you experience problems setting this value it might not be settable. Please t influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -269,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -299,7 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -309,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -319,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -351,7 +351,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -361,7 +361,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -371,7 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -381,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -391,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -401,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -411,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -421,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -846,7 +846,7 @@ def put_cassandra( The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -856,7 +856,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -866,7 +866,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -876,7 +876,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -888,7 +888,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -900,7 +900,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -910,7 +910,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -920,7 +920,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} --- @@ -930,7 +930,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -940,7 +940,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -965,7 +965,7 @@ def put_couchbase( A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -975,7 +975,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -985,7 +985,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -997,7 +997,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -1007,7 +1007,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -1017,7 +1017,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1027,7 +1027,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1037,7 +1037,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1064,7 +1064,7 @@ def put_elasticsearch( The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1074,7 +1074,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -1084,7 +1084,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1094,7 +1094,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -1104,7 +1104,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -1114,7 +1114,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -1124,7 +1124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -1134,7 +1134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -1144,7 +1144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -1154,7 +1154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1178,7 +1178,7 @@ def put_hana( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1188,7 +1188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -1198,7 +1198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1208,7 +1208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1218,7 +1218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1228,7 +1228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1238,7 +1238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1265,7 +1265,7 @@ def put_influxdb( Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -1275,7 +1275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1285,7 +1285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1295,7 +1295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -1305,7 +1305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1317,7 +1317,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -1329,7 +1329,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -1339,7 +1339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -1349,7 +1349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1359,7 +1359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1383,7 +1383,7 @@ def put_mongodb( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1393,7 +1393,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1403,7 +1403,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1413,7 +1413,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1423,7 +1423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1433,7 +1433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1443,7 +1443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1463,7 +1463,7 @@ def put_mongodbatlas( The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -1473,7 +1473,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -1483,7 +1483,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -1509,7 +1509,7 @@ def put_mssql( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1519,7 +1519,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -1529,7 +1529,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -1539,7 +1539,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1549,7 +1549,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1559,7 +1559,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1569,7 +1569,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1579,7 +1579,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1589,7 +1589,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1617,7 +1617,7 @@ def put_mysql( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -1627,7 +1627,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1637,7 +1637,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1647,7 +1647,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1657,7 +1657,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1667,7 +1667,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1677,7 +1677,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -1687,7 +1687,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -1699,7 +1699,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -1709,7 +1709,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1719,7 +1719,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1747,7 +1747,7 @@ def put_mysql_aurora( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -1757,7 +1757,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1767,7 +1767,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1777,7 +1777,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1787,7 +1787,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1797,7 +1797,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1807,7 +1807,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -1817,7 +1817,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -1829,7 +1829,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -1839,7 +1839,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1849,7 +1849,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1877,7 +1877,7 @@ def put_mysql_legacy( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -1887,7 +1887,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1897,7 +1897,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1907,7 +1907,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1917,7 +1917,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1927,7 +1927,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1937,7 +1937,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -1947,7 +1947,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -1959,7 +1959,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -1969,7 +1969,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1979,7 +1979,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2007,7 +2007,7 @@ def put_mysql_rds( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -2017,7 +2017,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2027,7 +2027,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2037,7 +2037,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2047,7 +2047,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2057,7 +2057,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2067,7 +2067,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -2077,7 +2077,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -2089,7 +2089,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -2099,7 +2099,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2109,7 +2109,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2135,7 +2135,7 @@ def put_oracle( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2145,7 +2145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -2155,7 +2155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2165,7 +2165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2175,7 +2175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2185,7 +2185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2195,7 +2195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -2205,7 +2205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2215,7 +2215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2242,7 +2242,7 @@ def put_postgresql( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -2252,7 +2252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2262,7 +2262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2272,7 +2272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2282,7 +2282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2292,7 +2292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2302,7 +2302,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2312,7 +2312,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -2322,7 +2322,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2332,7 +2332,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2356,7 +2356,7 @@ def put_redis( Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -2366,7 +2366,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2376,7 +2376,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2386,7 +2386,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -2396,7 +2396,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2406,7 +2406,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -2416,7 +2416,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2437,7 +2437,7 @@ def put_redis_elasticache( The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -2449,7 +2449,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2461,7 +2461,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -2473,7 +2473,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2498,7 +2498,7 @@ def put_redshift( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2508,7 +2508,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2518,7 +2518,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2528,7 +2528,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2538,7 +2538,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2548,7 +2548,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2558,7 +2558,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2568,7 +2568,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2592,7 +2592,7 @@ def put_snowflake( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2602,7 +2602,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2612,7 +2612,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2622,7 +2622,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2632,7 +2632,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2642,7 +2642,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2652,7 +2652,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2920,7 +2920,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -3757,7 +3757,7 @@ connect_timeout: typing.Union[int, float] The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -3771,7 +3771,7 @@ hosts: typing.List[str] Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -3785,7 +3785,7 @@ insecure_tls: typing.Union[bool, IResolvable] Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -3799,7 +3799,7 @@ password: str The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3815,7 +3815,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -3831,7 +3831,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -3845,7 +3845,7 @@ port: typing.Union[int, float] The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -3859,7 +3859,7 @@ protocol_version: typing.Union[int, float] The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} --- @@ -3873,7 +3873,7 @@ tls: typing.Union[bool, IResolvable] Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -3887,7 +3887,7 @@ username: str The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3955,7 +3955,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionConfig( | data | typing.Mapping[str] | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -4057,7 +4057,7 @@ backend: str Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -4071,7 +4071,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -4085,7 +4085,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -4099,7 +4099,7 @@ cassandra: DatabaseSecretBackendConnectionCassandra cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -4113,7 +4113,7 @@ couchbase: DatabaseSecretBackendConnectionCouchbase couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -4127,7 +4127,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -4141,7 +4141,7 @@ elasticsearch: DatabaseSecretBackendConnectionElasticsearch elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -4155,7 +4155,7 @@ hana: DatabaseSecretBackendConnectionHana hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -4167,7 +4167,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -4184,7 +4184,7 @@ influxdb: DatabaseSecretBackendConnectionInfluxdb influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -4198,7 +4198,7 @@ mongodb: DatabaseSecretBackendConnectionMongodb mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -4212,7 +4212,7 @@ mongodbatlas: DatabaseSecretBackendConnectionMongodbatlas mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -4226,7 +4226,7 @@ mssql: DatabaseSecretBackendConnectionMssql mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -4240,7 +4240,7 @@ mysql: DatabaseSecretBackendConnectionMysql mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -4254,7 +4254,7 @@ mysql_aurora: DatabaseSecretBackendConnectionMysqlAurora mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -4268,7 +4268,7 @@ mysql_legacy: DatabaseSecretBackendConnectionMysqlLegacy mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -4282,7 +4282,7 @@ mysql_rds: DatabaseSecretBackendConnectionMysqlRds mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -4296,7 +4296,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -4310,7 +4310,7 @@ oracle: DatabaseSecretBackendConnectionOracle oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -4326,7 +4326,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -4340,7 +4340,7 @@ postgresql: DatabaseSecretBackendConnectionPostgresql postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -4354,7 +4354,7 @@ redis: DatabaseSecretBackendConnectionRedis redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -4368,7 +4368,7 @@ redis_elasticache: DatabaseSecretBackendConnectionRedisElasticache redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -4382,7 +4382,7 @@ redshift: DatabaseSecretBackendConnectionRedshift redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -4396,7 +4396,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -4410,7 +4410,7 @@ snowflake: DatabaseSecretBackendConnectionSnowflake snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -4424,7 +4424,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -4472,7 +4472,7 @@ hosts: typing.List[str] A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -4486,7 +4486,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4500,7 +4500,7 @@ username: str Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4516,7 +4516,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -4530,7 +4530,7 @@ bucket_name: str Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -4544,7 +4544,7 @@ insecure_tls: typing.Union[bool, IResolvable] Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -4558,7 +4558,7 @@ tls: typing.Union[bool, IResolvable] Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -4572,7 +4572,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4624,7 +4624,7 @@ password: str The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4638,7 +4638,7 @@ url: str The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -4652,7 +4652,7 @@ username: str The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4666,7 +4666,7 @@ ca_cert: str The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -4680,7 +4680,7 @@ ca_path: str The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -4694,7 +4694,7 @@ client_cert: str The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -4708,7 +4708,7 @@ client_key: str The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -4722,7 +4722,7 @@ insecure: typing.Union[bool, IResolvable] Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -4736,7 +4736,7 @@ tls_server_name: str This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -4750,7 +4750,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4796,7 +4796,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4810,7 +4810,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4824,7 +4824,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4838,7 +4838,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4852,7 +4852,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4866,7 +4866,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4880,7 +4880,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4932,7 +4932,7 @@ host: str Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4946,7 +4946,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4960,7 +4960,7 @@ username: str Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4974,7 +4974,7 @@ connect_timeout: typing.Union[int, float] The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -4988,7 +4988,7 @@ insecure_tls: typing.Union[bool, IResolvable] Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -5004,7 +5004,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -5020,7 +5020,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -5034,7 +5034,7 @@ port: typing.Union[int, float] The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -5048,7 +5048,7 @@ tls: typing.Union[bool, IResolvable] Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -5062,7 +5062,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5108,7 +5108,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5122,7 +5122,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5136,7 +5136,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5150,7 +5150,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5164,7 +5164,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5178,7 +5178,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5192,7 +5192,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5230,7 +5230,7 @@ private_key: str The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -5244,7 +5244,7 @@ project_id: str The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -5258,7 +5258,7 @@ public_key: str The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -5308,7 +5308,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5322,7 +5322,7 @@ contained_db: typing.Union[bool, IResolvable] Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -5336,7 +5336,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -5350,7 +5350,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5364,7 +5364,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5378,7 +5378,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5392,7 +5392,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5406,7 +5406,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5420,7 +5420,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5474,7 +5474,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -5488,7 +5488,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5502,7 +5502,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5516,7 +5516,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5530,7 +5530,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5544,7 +5544,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5558,7 +5558,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -5572,7 +5572,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -5588,7 +5588,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -5602,7 +5602,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5616,7 +5616,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5670,7 +5670,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -5684,7 +5684,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5698,7 +5698,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5712,7 +5712,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5726,7 +5726,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5740,7 +5740,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5754,7 +5754,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -5768,7 +5768,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -5784,7 +5784,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -5798,7 +5798,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5812,7 +5812,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5866,7 +5866,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -5880,7 +5880,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5894,7 +5894,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5908,7 +5908,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5922,7 +5922,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5936,7 +5936,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5950,7 +5950,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -5964,7 +5964,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -5980,7 +5980,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -5994,7 +5994,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6008,7 +6008,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6062,7 +6062,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -6076,7 +6076,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6090,7 +6090,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6104,7 +6104,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6118,7 +6118,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -6132,7 +6132,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6146,7 +6146,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -6160,7 +6160,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -6176,7 +6176,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -6190,7 +6190,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6204,7 +6204,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6254,7 +6254,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6268,7 +6268,7 @@ disconnect_sessions: typing.Union[bool, IResolvable] Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -6282,7 +6282,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6296,7 +6296,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6310,7 +6310,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -6324,7 +6324,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6338,7 +6338,7 @@ split_statements: typing.Union[bool, IResolvable] Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -6352,7 +6352,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6366,7 +6366,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6418,7 +6418,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -6432,7 +6432,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6446,7 +6446,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -6460,7 +6460,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6474,7 +6474,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6488,7 +6488,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -6502,7 +6502,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6516,7 +6516,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -6530,7 +6530,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6544,7 +6544,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6590,7 +6590,7 @@ host: str Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -6604,7 +6604,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6618,7 +6618,7 @@ username: str Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6632,7 +6632,7 @@ ca_cert: str The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -6646,7 +6646,7 @@ insecure_tls: typing.Union[bool, IResolvable] Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -6660,7 +6660,7 @@ port: typing.Union[int, float] The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -6674,7 +6674,7 @@ tls: typing.Union[bool, IResolvable] Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -6714,7 +6714,7 @@ url: str The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -6730,7 +6730,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6746,7 +6746,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -6762,7 +6762,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6810,7 +6810,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6824,7 +6824,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -6838,7 +6838,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6852,7 +6852,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6866,7 +6866,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -6880,7 +6880,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6894,7 +6894,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6908,7 +6908,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6954,7 +6954,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6968,7 +6968,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6982,7 +6982,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6996,7 +6996,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -7010,7 +7010,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -7024,7 +7024,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -7038,7 +7038,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- diff --git a/docs/databaseSecretBackendConnection.typescript.md b/docs/databaseSecretBackendConnection.typescript.md index 38d92c7e..f375bbd3 100644 --- a/docs/databaseSecretBackendConnection.typescript.md +++ b/docs/databaseSecretBackendConnection.typescript.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers @@ -876,7 +876,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -1702,7 +1702,7 @@ public readonly connectTimeout: number; The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -1716,7 +1716,7 @@ public readonly hosts: string[]; Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -1730,7 +1730,7 @@ public readonly insecureTls: boolean | IResolvable; Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1744,7 +1744,7 @@ public readonly password: string; The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1760,7 +1760,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -1776,7 +1776,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -1790,7 +1790,7 @@ public readonly port: number; The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -1804,7 +1804,7 @@ public readonly protocolVersion: number; The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} --- @@ -1818,7 +1818,7 @@ public readonly tls: boolean | IResolvable; Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1832,7 +1832,7 @@ public readonly username: string; The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1865,7 +1865,7 @@ const databaseSecretBackendConnectionConfig: databaseSecretBackendConnection.Dat | data | {[ key: string ]: string} | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -1967,7 +1967,7 @@ public readonly backend: string; Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -1981,7 +1981,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -1995,7 +1995,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -2009,7 +2009,7 @@ public readonly cassandra: DatabaseSecretBackendConnectionCassandra; cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -2023,7 +2023,7 @@ public readonly couchbase: DatabaseSecretBackendConnectionCouchbase; couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -2037,7 +2037,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -2051,7 +2051,7 @@ public readonly elasticsearch: DatabaseSecretBackendConnectionElasticsearch; elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -2065,7 +2065,7 @@ public readonly hana: DatabaseSecretBackendConnectionHana; hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -2077,7 +2077,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2094,7 +2094,7 @@ public readonly influxdb: DatabaseSecretBackendConnectionInfluxdb; influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -2108,7 +2108,7 @@ public readonly mongodb: DatabaseSecretBackendConnectionMongodb; mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -2122,7 +2122,7 @@ public readonly mongodbatlas: DatabaseSecretBackendConnectionMongodbatlas; mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -2136,7 +2136,7 @@ public readonly mssql: DatabaseSecretBackendConnectionMssql; mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -2150,7 +2150,7 @@ public readonly mysql: DatabaseSecretBackendConnectionMysql; mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -2164,7 +2164,7 @@ public readonly mysqlAurora: DatabaseSecretBackendConnectionMysqlAurora; mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -2178,7 +2178,7 @@ public readonly mysqlLegacy: DatabaseSecretBackendConnectionMysqlLegacy; mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -2192,7 +2192,7 @@ public readonly mysqlRds: DatabaseSecretBackendConnectionMysqlRds; mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -2206,7 +2206,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -2220,7 +2220,7 @@ public readonly oracle: DatabaseSecretBackendConnectionOracle; oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -2236,7 +2236,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -2250,7 +2250,7 @@ public readonly postgresql: DatabaseSecretBackendConnectionPostgresql; postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -2264,7 +2264,7 @@ public readonly redis: DatabaseSecretBackendConnectionRedis; redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -2278,7 +2278,7 @@ public readonly redisElasticache: DatabaseSecretBackendConnectionRedisElasticach redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -2292,7 +2292,7 @@ public readonly redshift: DatabaseSecretBackendConnectionRedshift; redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -2306,7 +2306,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -2320,7 +2320,7 @@ public readonly snowflake: DatabaseSecretBackendConnectionSnowflake; snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -2334,7 +2334,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -2373,7 +2373,7 @@ public readonly hosts: string[]; A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2387,7 +2387,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2401,7 +2401,7 @@ public readonly username: string; Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2417,7 +2417,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -2431,7 +2431,7 @@ public readonly bucketName: string; Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -2445,7 +2445,7 @@ public readonly insecureTls: boolean | IResolvable; Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2459,7 +2459,7 @@ public readonly tls: boolean | IResolvable; Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2473,7 +2473,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2514,7 +2514,7 @@ public readonly password: string; The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2528,7 +2528,7 @@ public readonly url: string; The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -2542,7 +2542,7 @@ public readonly username: string; The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2556,7 +2556,7 @@ public readonly caCert: string; The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -2570,7 +2570,7 @@ public readonly caPath: string; The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -2584,7 +2584,7 @@ public readonly clientCert: string; The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -2598,7 +2598,7 @@ public readonly clientKey: string; The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -2612,7 +2612,7 @@ public readonly insecure: boolean | IResolvable; Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -2626,7 +2626,7 @@ public readonly tlsServerName: string; This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -2640,7 +2640,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2678,7 +2678,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2692,7 +2692,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2706,7 +2706,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2720,7 +2720,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2734,7 +2734,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2748,7 +2748,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2762,7 +2762,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2803,7 +2803,7 @@ public readonly host: string; Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -2817,7 +2817,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2831,7 +2831,7 @@ public readonly username: string; Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2845,7 +2845,7 @@ public readonly connectTimeout: number; The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -2859,7 +2859,7 @@ public readonly insecureTls: boolean | IResolvable; Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2875,7 +2875,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -2891,7 +2891,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -2905,7 +2905,7 @@ public readonly port: number; The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -2919,7 +2919,7 @@ public readonly tls: boolean | IResolvable; Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2933,7 +2933,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2971,7 +2971,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2985,7 +2985,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2999,7 +2999,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3013,7 +3013,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3027,7 +3027,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3041,7 +3041,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3055,7 +3055,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3089,7 +3089,7 @@ public readonly privateKey: string; The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -3103,7 +3103,7 @@ public readonly projectId: string; The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -3117,7 +3117,7 @@ public readonly publicKey: string; The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -3157,7 +3157,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3171,7 +3171,7 @@ public readonly containedDb: boolean | IResolvable; Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -3185,7 +3185,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3199,7 +3199,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3213,7 +3213,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3227,7 +3227,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3241,7 +3241,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3255,7 +3255,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3269,7 +3269,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3311,7 +3311,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3325,7 +3325,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3339,7 +3339,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3353,7 +3353,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3367,7 +3367,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3381,7 +3381,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3395,7 +3395,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3409,7 +3409,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3425,7 +3425,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3439,7 +3439,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3453,7 +3453,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3495,7 +3495,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3509,7 +3509,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3523,7 +3523,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3537,7 +3537,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3551,7 +3551,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3565,7 +3565,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3579,7 +3579,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3593,7 +3593,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3609,7 +3609,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3623,7 +3623,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3637,7 +3637,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3679,7 +3679,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3693,7 +3693,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3707,7 +3707,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3721,7 +3721,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3735,7 +3735,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3749,7 +3749,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3763,7 +3763,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3777,7 +3777,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3793,7 +3793,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3807,7 +3807,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3821,7 +3821,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3863,7 +3863,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3877,7 +3877,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3891,7 +3891,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3905,7 +3905,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3919,7 +3919,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3933,7 +3933,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3947,7 +3947,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3961,7 +3961,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3977,7 +3977,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3991,7 +3991,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4005,7 +4005,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4045,7 +4045,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4059,7 +4059,7 @@ public readonly disconnectSessions: boolean | IResolvable; Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -4073,7 +4073,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4087,7 +4087,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4101,7 +4101,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4115,7 +4115,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4129,7 +4129,7 @@ public readonly splitStatements: boolean | IResolvable; Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -4143,7 +4143,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4157,7 +4157,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4198,7 +4198,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4212,7 +4212,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4226,7 +4226,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4240,7 +4240,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4254,7 +4254,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4268,7 +4268,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4282,7 +4282,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4296,7 +4296,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4310,7 +4310,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4324,7 +4324,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4362,7 +4362,7 @@ public readonly host: string; Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4376,7 +4376,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4390,7 +4390,7 @@ public readonly username: string; Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4404,7 +4404,7 @@ public readonly caCert: string; The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -4418,7 +4418,7 @@ public readonly insecureTls: boolean | IResolvable; Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -4432,7 +4432,7 @@ public readonly port: number; The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -4446,7 +4446,7 @@ public readonly tls: boolean | IResolvable; Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -4481,7 +4481,7 @@ public readonly url: string; The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -4497,7 +4497,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4513,7 +4513,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -4529,7 +4529,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4568,7 +4568,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4582,7 +4582,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4596,7 +4596,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4610,7 +4610,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4624,7 +4624,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4638,7 +4638,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4652,7 +4652,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4666,7 +4666,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4704,7 +4704,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4718,7 +4718,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4732,7 +4732,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4746,7 +4746,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4760,7 +4760,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4774,7 +4774,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4788,7 +4788,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- diff --git a/docs/databaseSecretBackendRole.csharp.md b/docs/databaseSecretBackendRole.csharp.md index 2eff3e19..8fd4b152 100644 --- a/docs/databaseSecretBackendRole.csharp.md +++ b/docs/databaseSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1060,7 +1060,7 @@ new DatabaseSecretBackendRoleConfig { | CredentialConfig | System.Collections.Generic.IDictionary | Specifies the configuration for the given credential_type. | | CredentialType | string | Specifies the type of credential that will be generated for the role. | | DefaultTtl | double | Default TTL for leases associated with this role, in seconds. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | MaxTtl | double | Maximum TTL for leases associated with this role, in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | | RenewStatements | string[] | Database statements to execute to renew a user. | @@ -1149,7 +1149,7 @@ public string Backend { get; set; } The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1163,7 +1163,7 @@ public string[] CreationStatements { get; set; } Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1177,7 +1177,7 @@ public string DbName { get; set; } Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1191,7 +1191,7 @@ public string Name { get; set; } Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1205,7 +1205,7 @@ public System.Collections.Generic.IDictionary CredentialConfig { Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1219,7 +1219,7 @@ public string CredentialType { get; set; } Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1233,7 +1233,7 @@ public double DefaultTtl { get; set; } Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1245,7 +1245,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1262,7 +1262,7 @@ public double MaxTtl { get; set; } Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1276,7 +1276,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1290,7 +1290,7 @@ public string[] RenewStatements { get; set; } Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1304,7 +1304,7 @@ public string[] RevocationStatements { get; set; } Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1318,7 +1318,7 @@ public string[] RollbackStatements { get; set; } Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendRole.go.md b/docs/databaseSecretBackendRole.go.md index 9af73748..588550be 100644 --- a/docs/databaseSecretBackendRole.go.md +++ b/docs/databaseSecretBackendRole.go.md @@ -4,12 +4,12 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendrole" databasesecretbackendrole.NewDatabaseSecretBackendRole(scope Construct, id *string, config DatabaseSecretBackendRoleConfig) DatabaseSecretBackendRole ``` @@ -441,7 +441,7 @@ func ResetRollbackStatements() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendrole" databasesecretbackendrole.DatabaseSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -473,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendrole" databasesecretbackendrole.DatabaseSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +487,7 @@ databasesecretbackendrole.DatabaseSecretBackendRole_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendrole" databasesecretbackendrole.DatabaseSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +501,7 @@ databasesecretbackendrole.DatabaseSecretBackendRole_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendrole" databasesecretbackendrole.DatabaseSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -530,7 +530,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1016,7 +1016,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendrole" &databasesecretbackendrole.DatabaseSecretBackendRoleConfig { Connection: interface{}, @@ -1060,7 +1060,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackend | CredentialConfig | *map[string]*string | Specifies the configuration for the given credential_type. | | CredentialType | *string | Specifies the type of credential that will be generated for the role. | | DefaultTtl | *f64 | Default TTL for leases associated with this role, in seconds. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | MaxTtl | *f64 | Maximum TTL for leases associated with this role, in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | | RenewStatements | *[]*string | Database statements to execute to renew a user. | @@ -1149,7 +1149,7 @@ Backend *string The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1163,7 +1163,7 @@ CreationStatements *[]*string Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1177,7 +1177,7 @@ DbName *string Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1191,7 +1191,7 @@ Name *string Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1205,7 +1205,7 @@ CredentialConfig *map[string]*string Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1219,7 +1219,7 @@ CredentialType *string Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1233,7 +1233,7 @@ DefaultTtl *f64 Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1245,7 +1245,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1262,7 +1262,7 @@ MaxTtl *f64 Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1276,7 +1276,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1290,7 +1290,7 @@ RenewStatements *[]*string Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1304,7 +1304,7 @@ RevocationStatements *[]*string Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1318,7 +1318,7 @@ RollbackStatements *[]*string Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendRole.java.md b/docs/databaseSecretBackendRole.java.md index 4dc8b705..13181222 100644 --- a/docs/databaseSecretBackendRole.java.md +++ b/docs/databaseSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers @@ -57,7 +57,7 @@ DatabaseSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | credentialConfig | java.util.Map | Specifies the configuration for the given credential_type. | | credentialType | java.lang.String | Specifies the type of credential that will be generated for the role. | | defaultTtl | java.lang.Number | Default TTL for leases associated with this role, in seconds. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | maxTtl | java.lang.Number | Maximum TTL for leases associated with this role, in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | renewStatements | java.util.List | Database statements to execute to renew a user. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -213,7 +213,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- @@ -743,7 +743,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1277,7 +1277,7 @@ DatabaseSecretBackendRoleConfig.builder() | credentialConfig | java.util.Map | Specifies the configuration for the given credential_type. | | credentialType | java.lang.String | Specifies the type of credential that will be generated for the role. | | defaultTtl | java.lang.Number | Default TTL for leases associated with this role, in seconds. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | maxTtl | java.lang.Number | Maximum TTL for leases associated with this role, in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | renewStatements | java.util.List | Database statements to execute to renew a user. | @@ -1366,7 +1366,7 @@ public java.lang.String getBackend(); The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1380,7 +1380,7 @@ public java.util.List getCreationStatements(); Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1394,7 +1394,7 @@ public java.lang.String getDbName(); Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1408,7 +1408,7 @@ public java.lang.String getName(); Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1422,7 +1422,7 @@ public java.util.Map getCredentialConfig(); Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1436,7 +1436,7 @@ public java.lang.String getCredentialType(); Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1450,7 +1450,7 @@ public java.lang.Number getDefaultTtl(); Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1462,7 +1462,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1479,7 +1479,7 @@ public java.lang.Number getMaxTtl(); Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1493,7 +1493,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1507,7 +1507,7 @@ public java.util.List getRenewStatements(); Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1521,7 +1521,7 @@ public java.util.List getRevocationStatements(); Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1535,7 +1535,7 @@ public java.util.List getRollbackStatements(); Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendRole.python.md b/docs/databaseSecretBackendRole.python.md index 11fc599e..82be79a4 100644 --- a/docs/databaseSecretBackendRole.python.md +++ b/docs/databaseSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers @@ -55,7 +55,7 @@ databaseSecretBackendRole.DatabaseSecretBackendRole( | credential_config | typing.Mapping[str] | Specifies the configuration for the given credential_type. | | credential_type | str | Specifies the type of credential that will be generated for the role. | | default_ttl | typing.Union[int, float] | Default TTL for leases associated with this role, in seconds. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | max_ttl | typing.Union[int, float] | Maximum TTL for leases associated with this role, in seconds. | | namespace | str | Target namespace. (requires Enterprise). | | renew_statements | typing.List[str] | Database statements to execute to renew a user. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -211,7 +211,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- @@ -787,7 +787,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1317,7 +1317,7 @@ databaseSecretBackendRole.DatabaseSecretBackendRoleConfig( | credential_config | typing.Mapping[str] | Specifies the configuration for the given credential_type. | | credential_type | str | Specifies the type of credential that will be generated for the role. | | default_ttl | typing.Union[int, float] | Default TTL for leases associated with this role, in seconds. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | max_ttl | typing.Union[int, float] | Maximum TTL for leases associated with this role, in seconds. | | namespace | str | Target namespace. (requires Enterprise). | | renew_statements | typing.List[str] | Database statements to execute to renew a user. | @@ -1406,7 +1406,7 @@ backend: str The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1420,7 +1420,7 @@ creation_statements: typing.List[str] Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1434,7 +1434,7 @@ db_name: str Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1448,7 +1448,7 @@ name: str Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1462,7 +1462,7 @@ credential_config: typing.Mapping[str] Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1476,7 +1476,7 @@ credential_type: str Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1490,7 +1490,7 @@ default_ttl: typing.Union[int, float] Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1502,7 +1502,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1519,7 +1519,7 @@ max_ttl: typing.Union[int, float] Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1533,7 +1533,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1547,7 +1547,7 @@ renew_statements: typing.List[str] Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1561,7 +1561,7 @@ revocation_statements: typing.List[str] Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1575,7 +1575,7 @@ rollback_statements: typing.List[str] Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendRole.typescript.md b/docs/databaseSecretBackendRole.typescript.md index f07af04e..8f197595 100644 --- a/docs/databaseSecretBackendRole.typescript.md +++ b/docs/databaseSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1039,7 +1039,7 @@ const databaseSecretBackendRoleConfig: databaseSecretBackendRole.DatabaseSecretB | credentialConfig | {[ key: string ]: string} | Specifies the configuration for the given credential_type. | | credentialType | string | Specifies the type of credential that will be generated for the role. | | defaultTtl | number | Default TTL for leases associated with this role, in seconds. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | maxTtl | number | Maximum TTL for leases associated with this role, in seconds. | | namespace | string | Target namespace. (requires Enterprise). | | renewStatements | string[] | Database statements to execute to renew a user. | @@ -1128,7 +1128,7 @@ public readonly backend: string; The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1142,7 +1142,7 @@ public readonly creationStatements: string[]; Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1156,7 +1156,7 @@ public readonly dbName: string; Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1170,7 +1170,7 @@ public readonly name: string; Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1184,7 +1184,7 @@ public readonly credentialConfig: {[ key: string ]: string}; Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1198,7 +1198,7 @@ public readonly credentialType: string; Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1212,7 +1212,7 @@ public readonly defaultTtl: number; Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1224,7 +1224,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1241,7 +1241,7 @@ public readonly maxTtl: number; Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1255,7 +1255,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1269,7 +1269,7 @@ public readonly renewStatements: string[]; Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1283,7 +1283,7 @@ public readonly revocationStatements: string[]; Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1297,7 +1297,7 @@ public readonly rollbackStatements: string[]; Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendStaticRole.csharp.md b/docs/databaseSecretBackendStaticRole.csharp.md index 3f5a0e09..eada608e 100644 --- a/docs/databaseSecretBackendStaticRole.csharp.md +++ b/docs/databaseSecretBackendStaticRole.csharp.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -967,7 +967,7 @@ new DatabaseSecretBackendStaticRoleConfig { | DbName | string | Database connection to use for this role. | | Name | string | Unique name for the static role. | | Username | string | The database username that this role corresponds to. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | RotationPeriod | double | The amount of time Vault should wait before rotating the password, in seconds. | | RotationSchedule | string | A cron-style string that will define the schedule on which rotations should occur. | @@ -1056,7 +1056,7 @@ public string Backend { get; set; } The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1070,7 +1070,7 @@ public string DbName { get; set; } Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1084,7 +1084,7 @@ public string Name { get; set; } Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1098,7 +1098,7 @@ public string Username { get; set; } The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1110,7 +1110,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1127,7 +1127,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1141,7 +1141,7 @@ public double RotationPeriod { get; set; } The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1155,7 +1155,7 @@ public string RotationSchedule { get; set; } A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1169,7 +1169,7 @@ public string[] RotationStatements { get; set; } Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1183,7 +1183,7 @@ public double RotationWindow { get; set; } The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} --- diff --git a/docs/databaseSecretBackendStaticRole.go.md b/docs/databaseSecretBackendStaticRole.go.md index 2edbe919..2cdb532e 100644 --- a/docs/databaseSecretBackendStaticRole.go.md +++ b/docs/databaseSecretBackendStaticRole.go.md @@ -4,12 +4,12 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendstaticrole" databasesecretbackendstaticrole.NewDatabaseSecretBackendStaticRole(scope Construct, id *string, config DatabaseSecretBackendStaticRoleConfig) DatabaseSecretBackendStaticRole ``` @@ -420,7 +420,7 @@ func ResetRotationWindow() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendstaticrole" databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsConstruct(x interface{}) *bool ``` @@ -452,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendstaticrole" databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +466,7 @@ databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsTerraformEleme ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendstaticrole" databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +480,7 @@ databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_IsTerraformResou ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendstaticrole" databasesecretbackendstaticrole.DatabaseSecretBackendStaticRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +509,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -929,7 +929,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackendstaticrole" &databasesecretbackendstaticrole.DatabaseSecretBackendStaticRoleConfig { Connection: interface{}, @@ -967,7 +967,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretbackend | DbName | *string | Database connection to use for this role. | | Name | *string | Unique name for the static role. | | Username | *string | The database username that this role corresponds to. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | RotationPeriod | *f64 | The amount of time Vault should wait before rotating the password, in seconds. | | RotationSchedule | *string | A cron-style string that will define the schedule on which rotations should occur. | @@ -1056,7 +1056,7 @@ Backend *string The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1070,7 +1070,7 @@ DbName *string Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1084,7 +1084,7 @@ Name *string Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1098,7 +1098,7 @@ Username *string The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1110,7 +1110,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1127,7 +1127,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1141,7 +1141,7 @@ RotationPeriod *f64 The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1155,7 +1155,7 @@ RotationSchedule *string A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1169,7 +1169,7 @@ RotationStatements *[]*string Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1183,7 +1183,7 @@ RotationWindow *f64 The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} --- diff --git a/docs/databaseSecretBackendStaticRole.java.md b/docs/databaseSecretBackendStaticRole.java.md index dafc008f..b836b999 100644 --- a/docs/databaseSecretBackendStaticRole.java.md +++ b/docs/databaseSecretBackendStaticRole.java.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers @@ -51,7 +51,7 @@ DatabaseSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String | dbName | java.lang.String | Database connection to use for this role. | | name | java.lang.String | Unique name for the static role. | | username | java.lang.String | The database username that this role corresponds to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rotationPeriod | java.lang.Number | The amount of time Vault should wait before rotating the password, in seconds. | | rotationSchedule | java.lang.String | A cron-style string that will define the schedule on which rotations should occur. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} --- @@ -686,7 +686,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -1148,7 +1148,7 @@ DatabaseSecretBackendStaticRoleConfig.builder() | dbName | java.lang.String | Database connection to use for this role. | | name | java.lang.String | Unique name for the static role. | | username | java.lang.String | The database username that this role corresponds to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rotationPeriod | java.lang.Number | The amount of time Vault should wait before rotating the password, in seconds. | | rotationSchedule | java.lang.String | A cron-style string that will define the schedule on which rotations should occur. | @@ -1237,7 +1237,7 @@ public java.lang.String getBackend(); The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1251,7 +1251,7 @@ public java.lang.String getDbName(); Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1265,7 +1265,7 @@ public java.lang.String getName(); Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1279,7 +1279,7 @@ public java.lang.String getUsername(); The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1291,7 +1291,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1308,7 +1308,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1322,7 +1322,7 @@ public java.lang.Number getRotationPeriod(); The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1336,7 +1336,7 @@ public java.lang.String getRotationSchedule(); A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1350,7 +1350,7 @@ public java.util.List getRotationStatements(); Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1364,7 +1364,7 @@ public java.lang.Number getRotationWindow(); The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} --- diff --git a/docs/databaseSecretBackendStaticRole.python.md b/docs/databaseSecretBackendStaticRole.python.md index 923d9a68..3b1e372b 100644 --- a/docs/databaseSecretBackendStaticRole.python.md +++ b/docs/databaseSecretBackendStaticRole.python.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers @@ -49,7 +49,7 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRole( | db_name | str | Database connection to use for this role. | | name | str | Unique name for the static role. | | username | str | The database username that this role corresponds to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rotation_period | typing.Union[int, float] | The amount of time Vault should wait before rotating the password, in seconds. | | rotation_schedule | str | A cron-style string that will define the schedule on which rotations should occur. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -175,7 +175,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} --- @@ -730,7 +730,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -1188,7 +1188,7 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRoleConfig( | db_name | str | Database connection to use for this role. | | name | str | Unique name for the static role. | | username | str | The database username that this role corresponds to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rotation_period | typing.Union[int, float] | The amount of time Vault should wait before rotating the password, in seconds. | | rotation_schedule | str | A cron-style string that will define the schedule on which rotations should occur. | @@ -1277,7 +1277,7 @@ backend: str The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1291,7 +1291,7 @@ db_name: str Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1305,7 +1305,7 @@ name: str Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1319,7 +1319,7 @@ username: str The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1331,7 +1331,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1348,7 +1348,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1362,7 +1362,7 @@ rotation_period: typing.Union[int, float] The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1376,7 +1376,7 @@ rotation_schedule: str A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1390,7 +1390,7 @@ rotation_statements: typing.List[str] Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1404,7 +1404,7 @@ rotation_window: typing.Union[int, float] The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} --- diff --git a/docs/databaseSecretBackendStaticRole.typescript.md b/docs/databaseSecretBackendStaticRole.typescript.md index ced403b2..1c2ca195 100644 --- a/docs/databaseSecretBackendStaticRole.typescript.md +++ b/docs/databaseSecretBackendStaticRole.typescript.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -949,7 +949,7 @@ const databaseSecretBackendStaticRoleConfig: databaseSecretBackendStaticRole.Dat | dbName | string | Database connection to use for this role. | | name | string | Unique name for the static role. | | username | string | The database username that this role corresponds to. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | rotationPeriod | number | The amount of time Vault should wait before rotating the password, in seconds. | | rotationSchedule | string | A cron-style string that will define the schedule on which rotations should occur. | @@ -1038,7 +1038,7 @@ public readonly backend: string; The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1052,7 +1052,7 @@ public readonly dbName: string; Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1066,7 +1066,7 @@ public readonly name: string; Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1080,7 +1080,7 @@ public readonly username: string; The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1092,7 +1092,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1109,7 +1109,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1123,7 +1123,7 @@ public readonly rotationPeriod: number; The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1137,7 +1137,7 @@ public readonly rotationSchedule: string; A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1151,7 +1151,7 @@ public readonly rotationStatements: string[]; Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1165,7 +1165,7 @@ public readonly rotationWindow: number; The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} --- diff --git a/docs/databaseSecretsMount.csharp.md b/docs/databaseSecretsMount.csharp.md index b52112ce..18035acd 100644 --- a/docs/databaseSecretsMount.csharp.md +++ b/docs/databaseSecretsMount.csharp.md @@ -4,7 +4,7 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers @@ -911,7 +911,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -1870,7 +1870,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -1884,7 +1884,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -1898,7 +1898,7 @@ public double ConnectTimeout { get; set; } The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -1912,7 +1912,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -1926,7 +1926,7 @@ public string[] Hosts { get; set; } Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -1940,7 +1940,7 @@ public object InsecureTls { get; set; } Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -1954,7 +1954,7 @@ public string Password { get; set; } The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -1970,7 +1970,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -1986,7 +1986,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -2002,7 +2002,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2016,7 +2016,7 @@ public double Port { get; set; } The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2030,7 +2030,7 @@ public double ProtocolVersion { get; set; } The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2044,7 +2044,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -2058,7 +2058,7 @@ public object Tls { get; set; } Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2072,7 +2072,7 @@ public string Username { get; set; } The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2086,7 +2086,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2161,7 +2161,7 @@ new DatabaseSecretsMountConfig { | Elasticsearch | object | elasticsearch block. | | ExternalEntropyAccess | object | Enable the secrets engine to access Vault's external entropy source. | | Hana | object | hana block. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | Influxdb | object | influxdb block. | | Local | object | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for tokens and secrets in seconds. | @@ -2264,7 +2264,7 @@ public string Path { get; set; } Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -2278,7 +2278,7 @@ public string[] AllowedManagedKeys { get; set; } List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -2292,7 +2292,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -2306,7 +2306,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -2320,7 +2320,7 @@ public object Cassandra { get; set; } cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -2334,7 +2334,7 @@ public object Couchbase { get; set; } couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -2348,7 +2348,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -2362,7 +2362,7 @@ public string Description { get; set; } Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -2376,7 +2376,7 @@ public object Elasticsearch { get; set; } elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -2390,7 +2390,7 @@ public object ExternalEntropyAccess { get; set; } Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -2404,7 +2404,7 @@ public object Hana { get; set; } hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -2416,7 +2416,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2433,7 +2433,7 @@ public object Influxdb { get; set; } influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -2447,7 +2447,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -2461,7 +2461,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -2475,7 +2475,7 @@ public object Mongodb { get; set; } mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -2489,7 +2489,7 @@ public object Mongodbatlas { get; set; } mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -2503,7 +2503,7 @@ public object Mssql { get; set; } mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -2517,7 +2517,7 @@ public object Mysql { get; set; } mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -2531,7 +2531,7 @@ public object MysqlAurora { get; set; } mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -2545,7 +2545,7 @@ public object MysqlLegacy { get; set; } mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -2559,7 +2559,7 @@ public object MysqlRds { get; set; } mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -2573,7 +2573,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -2587,7 +2587,7 @@ public System.Collections.Generic.IDictionary Options { get; set Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -2601,7 +2601,7 @@ public object Oracle { get; set; } oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -2615,7 +2615,7 @@ public object Postgresql { get; set; } postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -2629,7 +2629,7 @@ public object Redis { get; set; } redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -2643,7 +2643,7 @@ public object RedisElasticache { get; set; } redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -2657,7 +2657,7 @@ public object Redshift { get; set; } redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -2671,7 +2671,7 @@ public object SealWrap { get; set; } Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -2685,7 +2685,7 @@ public object Snowflake { get; set; } snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -2745,7 +2745,7 @@ public string[] Hosts { get; set; } A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2759,7 +2759,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2773,7 +2773,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2787,7 +2787,7 @@ public string Username { get; set; } Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2801,7 +2801,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2817,7 +2817,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -2831,7 +2831,7 @@ public string BucketName { get; set; } Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -2845,7 +2845,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2859,7 +2859,7 @@ public object InsecureTls { get; set; } Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2875,7 +2875,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2889,7 +2889,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -2903,7 +2903,7 @@ public object Tls { get; set; } Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2917,7 +2917,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -2931,7 +2931,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2995,7 +2995,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3009,7 +3009,7 @@ public string Password { get; set; } The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3023,7 +3023,7 @@ public string Url { get; set; } The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -3037,7 +3037,7 @@ public string Username { get; set; } The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3051,7 +3051,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3065,7 +3065,7 @@ public string CaCert { get; set; } The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -3079,7 +3079,7 @@ public string CaPath { get; set; } The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3093,7 +3093,7 @@ public string ClientCert { get; set; } The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3107,7 +3107,7 @@ public string ClientKey { get; set; } The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3121,7 +3121,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3135,7 +3135,7 @@ public object Insecure { get; set; } Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -3151,7 +3151,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3165,7 +3165,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3179,7 +3179,7 @@ public string TlsServerName { get; set; } This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -3193,7 +3193,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3207,7 +3207,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3265,7 +3265,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3279,7 +3279,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3293,7 +3293,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3307,7 +3307,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3321,7 +3321,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -3335,7 +3335,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3349,7 +3349,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3363,7 +3363,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3377,7 +3377,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3393,7 +3393,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3407,7 +3407,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3421,7 +3421,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3435,7 +3435,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3499,7 +3499,7 @@ public string Host { get; set; } Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -3513,7 +3513,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3527,7 +3527,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3541,7 +3541,7 @@ public string Username { get; set; } Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3555,7 +3555,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3569,7 +3569,7 @@ public double ConnectTimeout { get; set; } The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -3583,7 +3583,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3597,7 +3597,7 @@ public object InsecureTls { get; set; } Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3613,7 +3613,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -3629,7 +3629,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -3645,7 +3645,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3659,7 +3659,7 @@ public double Port { get; set; } The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -3673,7 +3673,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3687,7 +3687,7 @@ public object Tls { get; set; } Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3701,7 +3701,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3715,7 +3715,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3773,7 +3773,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3787,7 +3787,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3801,7 +3801,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3815,7 +3815,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3829,7 +3829,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3843,7 +3843,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3857,7 +3857,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3871,7 +3871,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3887,7 +3887,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3901,7 +3901,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3915,7 +3915,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3929,7 +3929,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3943,7 +3943,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3993,7 +3993,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4007,7 +4007,7 @@ public string PrivateKey { get; set; } The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -4021,7 +4021,7 @@ public string ProjectId { get; set; } The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -4035,7 +4035,7 @@ public string PublicKey { get; set; } The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -4049,7 +4049,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4063,7 +4063,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4079,7 +4079,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4093,7 +4093,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4107,7 +4107,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4169,7 +4169,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4183,7 +4183,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4197,7 +4197,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4211,7 +4211,7 @@ public object ContainedDb { get; set; } Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -4225,7 +4225,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4239,7 +4239,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4253,7 +4253,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4267,7 +4267,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4281,7 +4281,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4295,7 +4295,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4311,7 +4311,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4325,7 +4325,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4339,7 +4339,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4353,7 +4353,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4367,7 +4367,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4433,7 +4433,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4447,7 +4447,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4461,7 +4461,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4475,7 +4475,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4489,7 +4489,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4503,7 +4503,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4517,7 +4517,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4531,7 +4531,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4545,7 +4545,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4561,7 +4561,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4575,7 +4575,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4589,7 +4589,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4603,7 +4603,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4619,7 +4619,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4633,7 +4633,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4647,7 +4647,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4661,7 +4661,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4727,7 +4727,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4741,7 +4741,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4755,7 +4755,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4769,7 +4769,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4783,7 +4783,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4797,7 +4797,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4811,7 +4811,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4825,7 +4825,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4839,7 +4839,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4855,7 +4855,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4869,7 +4869,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4883,7 +4883,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4897,7 +4897,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4913,7 +4913,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4927,7 +4927,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4941,7 +4941,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4955,7 +4955,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5021,7 +5021,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5035,7 +5035,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5049,7 +5049,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5063,7 +5063,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5077,7 +5077,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5091,7 +5091,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5105,7 +5105,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5119,7 +5119,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5133,7 +5133,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5149,7 +5149,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5163,7 +5163,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5177,7 +5177,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5191,7 +5191,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5207,7 +5207,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5221,7 +5221,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5235,7 +5235,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5249,7 +5249,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5315,7 +5315,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5329,7 +5329,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5343,7 +5343,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5357,7 +5357,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5371,7 +5371,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5385,7 +5385,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5399,7 +5399,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5413,7 +5413,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5427,7 +5427,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5443,7 +5443,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5457,7 +5457,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5471,7 +5471,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5485,7 +5485,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5501,7 +5501,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5515,7 +5515,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5529,7 +5529,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5543,7 +5543,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5605,7 +5605,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5619,7 +5619,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5633,7 +5633,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5647,7 +5647,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5661,7 +5661,7 @@ public object DisconnectSessions { get; set; } Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -5675,7 +5675,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5689,7 +5689,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5703,7 +5703,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5717,7 +5717,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5733,7 +5733,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5747,7 +5747,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5761,7 +5761,7 @@ public object SplitStatements { get; set; } Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -5775,7 +5775,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5789,7 +5789,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5803,7 +5803,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5867,7 +5867,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5881,7 +5881,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5895,7 +5895,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5909,7 +5909,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5923,7 +5923,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5937,7 +5937,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -5951,7 +5951,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5965,7 +5965,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5979,7 +5979,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5993,7 +5993,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6009,7 +6009,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6023,7 +6023,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6037,7 +6037,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -6051,7 +6051,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6065,7 +6065,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6079,7 +6079,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6137,7 +6137,7 @@ public string Host { get; set; } Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -6151,7 +6151,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6165,7 +6165,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6179,7 +6179,7 @@ public string Username { get; set; } Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6193,7 +6193,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6207,7 +6207,7 @@ public string CaCert { get; set; } The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -6221,7 +6221,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6235,7 +6235,7 @@ public object InsecureTls { get; set; } Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -6251,7 +6251,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6265,7 +6265,7 @@ public double Port { get; set; } The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -6279,7 +6279,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6293,7 +6293,7 @@ public object Tls { get; set; } Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -6307,7 +6307,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6359,7 +6359,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6373,7 +6373,7 @@ public string Url { get; set; } The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -6387,7 +6387,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6401,7 +6401,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6417,7 +6417,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6433,7 +6433,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6449,7 +6449,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -6463,7 +6463,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6479,7 +6479,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6493,7 +6493,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6553,7 +6553,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6567,7 +6567,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6581,7 +6581,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6595,7 +6595,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6609,7 +6609,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6623,7 +6623,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6637,7 +6637,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6651,7 +6651,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6665,7 +6665,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6681,7 +6681,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6695,7 +6695,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6709,7 +6709,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6723,7 +6723,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6737,7 +6737,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6795,7 +6795,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6809,7 +6809,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6823,7 +6823,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6837,7 +6837,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6851,7 +6851,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6865,7 +6865,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6879,7 +6879,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6893,7 +6893,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6909,7 +6909,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6923,7 +6923,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6937,7 +6937,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6951,7 +6951,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6965,7 +6965,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- diff --git a/docs/databaseSecretsMount.go.md b/docs/databaseSecretsMount.go.md index b97f0824..85900835 100644 --- a/docs/databaseSecretsMount.go.md +++ b/docs/databaseSecretsMount.go.md @@ -4,12 +4,12 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMount(scope Construct, id *string, config DatabaseSecretsMountConfig) DatabaseSecretsMount ``` @@ -822,7 +822,7 @@ func ResetSnowflake() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.DatabaseSecretsMount_IsConstruct(x interface{}) *bool ``` @@ -854,7 +854,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.DatabaseSecretsMount_IsTerraformElement(x interface{}) *bool ``` @@ -868,7 +868,7 @@ databasesecretsmount.DatabaseSecretsMount_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.DatabaseSecretsMount_IsTerraformResource(x interface{}) *bool ``` @@ -882,7 +882,7 @@ databasesecretsmount.DatabaseSecretsMount_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.DatabaseSecretsMount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -911,7 +911,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -1815,7 +1815,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountCassandra { Name: *string, @@ -1870,7 +1870,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -1884,7 +1884,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -1898,7 +1898,7 @@ ConnectTimeout *f64 The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -1912,7 +1912,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -1926,7 +1926,7 @@ Hosts *[]*string Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -1940,7 +1940,7 @@ InsecureTls interface{} Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -1954,7 +1954,7 @@ Password *string The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -1970,7 +1970,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -1986,7 +1986,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -2002,7 +2002,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2016,7 +2016,7 @@ Port *f64 The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2030,7 +2030,7 @@ ProtocolVersion *f64 The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2044,7 +2044,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -2058,7 +2058,7 @@ Tls interface{} Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2072,7 +2072,7 @@ Username *string The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2086,7 +2086,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2095,7 +2095,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountConfig { Connection: interface{}, @@ -2161,7 +2161,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" | Elasticsearch | interface{} | elasticsearch block. | | ExternalEntropyAccess | interface{} | Enable the secrets engine to access Vault's external entropy source. | | Hana | interface{} | hana block. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | Influxdb | interface{} | influxdb block. | | Local | interface{} | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for tokens and secrets in seconds. | @@ -2264,7 +2264,7 @@ Path *string Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -2278,7 +2278,7 @@ AllowedManagedKeys *[]*string List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -2292,7 +2292,7 @@ AuditNonHmacRequestKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -2306,7 +2306,7 @@ AuditNonHmacResponseKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -2320,7 +2320,7 @@ Cassandra interface{} cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -2334,7 +2334,7 @@ Couchbase interface{} couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -2348,7 +2348,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -2362,7 +2362,7 @@ Description *string Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -2376,7 +2376,7 @@ Elasticsearch interface{} elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -2390,7 +2390,7 @@ ExternalEntropyAccess interface{} Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -2404,7 +2404,7 @@ Hana interface{} hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -2416,7 +2416,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2433,7 +2433,7 @@ Influxdb interface{} influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -2447,7 +2447,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -2461,7 +2461,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -2475,7 +2475,7 @@ Mongodb interface{} mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -2489,7 +2489,7 @@ Mongodbatlas interface{} mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -2503,7 +2503,7 @@ Mssql interface{} mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -2517,7 +2517,7 @@ Mysql interface{} mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -2531,7 +2531,7 @@ MysqlAurora interface{} mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -2545,7 +2545,7 @@ MysqlLegacy interface{} mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -2559,7 +2559,7 @@ MysqlRds interface{} mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -2573,7 +2573,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -2587,7 +2587,7 @@ Options *map[string]*string Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -2601,7 +2601,7 @@ Oracle interface{} oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -2615,7 +2615,7 @@ Postgresql interface{} postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -2629,7 +2629,7 @@ Redis interface{} redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -2643,7 +2643,7 @@ RedisElasticache interface{} redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -2657,7 +2657,7 @@ Redshift interface{} redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -2671,7 +2671,7 @@ SealWrap interface{} Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -2685,7 +2685,7 @@ Snowflake interface{} snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -2694,7 +2694,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountCouchbase { Hosts: *[]*string, @@ -2745,7 +2745,7 @@ Hosts *[]*string A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2759,7 +2759,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2773,7 +2773,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2787,7 +2787,7 @@ Username *string Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2801,7 +2801,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2817,7 +2817,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -2831,7 +2831,7 @@ BucketName *string Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -2845,7 +2845,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2859,7 +2859,7 @@ InsecureTls interface{} Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2875,7 +2875,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2889,7 +2889,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -2903,7 +2903,7 @@ Tls interface{} Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2917,7 +2917,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -2931,7 +2931,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2940,7 +2940,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountElasticsearch { Name: *string, @@ -2995,7 +2995,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3009,7 +3009,7 @@ Password *string The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3023,7 +3023,7 @@ Url *string The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -3037,7 +3037,7 @@ Username *string The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3051,7 +3051,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3065,7 +3065,7 @@ CaCert *string The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -3079,7 +3079,7 @@ CaPath *string The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3093,7 +3093,7 @@ ClientCert *string The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3107,7 +3107,7 @@ ClientKey *string The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3121,7 +3121,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3135,7 +3135,7 @@ Insecure interface{} Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -3151,7 +3151,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3165,7 +3165,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3179,7 +3179,7 @@ TlsServerName *string This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -3193,7 +3193,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3207,7 +3207,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3216,7 +3216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountHana { Name: *string, @@ -3265,7 +3265,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3279,7 +3279,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3293,7 +3293,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3307,7 +3307,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3321,7 +3321,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -3335,7 +3335,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3349,7 +3349,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3363,7 +3363,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3377,7 +3377,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3393,7 +3393,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3407,7 +3407,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3421,7 +3421,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3435,7 +3435,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3444,7 +3444,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountInfluxdb { Host: *string, @@ -3499,7 +3499,7 @@ Host *string Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -3513,7 +3513,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3527,7 +3527,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3541,7 +3541,7 @@ Username *string Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3555,7 +3555,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3569,7 +3569,7 @@ ConnectTimeout *f64 The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -3583,7 +3583,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3597,7 +3597,7 @@ InsecureTls interface{} Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3613,7 +3613,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -3629,7 +3629,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -3645,7 +3645,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3659,7 +3659,7 @@ Port *f64 The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -3673,7 +3673,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3687,7 +3687,7 @@ Tls interface{} Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3701,7 +3701,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3715,7 +3715,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3724,7 +3724,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMongodb { Name: *string, @@ -3773,7 +3773,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3787,7 +3787,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3801,7 +3801,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3815,7 +3815,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3829,7 +3829,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3843,7 +3843,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3857,7 +3857,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3871,7 +3871,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3887,7 +3887,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3901,7 +3901,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3915,7 +3915,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3929,7 +3929,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3943,7 +3943,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3952,7 +3952,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMongodbatlas { Name: *string, @@ -3993,7 +3993,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4007,7 +4007,7 @@ PrivateKey *string The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -4021,7 +4021,7 @@ ProjectId *string The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -4035,7 +4035,7 @@ PublicKey *string The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -4049,7 +4049,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4063,7 +4063,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4079,7 +4079,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4093,7 +4093,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4107,7 +4107,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4116,7 +4116,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMssql { Name: *string, @@ -4169,7 +4169,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4183,7 +4183,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4197,7 +4197,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4211,7 +4211,7 @@ ContainedDb interface{} Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -4225,7 +4225,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4239,7 +4239,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4253,7 +4253,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4267,7 +4267,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4281,7 +4281,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4295,7 +4295,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4311,7 +4311,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4325,7 +4325,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4339,7 +4339,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4353,7 +4353,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4367,7 +4367,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4376,7 +4376,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMysql { Name: *string, @@ -4433,7 +4433,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4447,7 +4447,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4461,7 +4461,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4475,7 +4475,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4489,7 +4489,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4503,7 +4503,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4517,7 +4517,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4531,7 +4531,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4545,7 +4545,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4561,7 +4561,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4575,7 +4575,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4589,7 +4589,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4603,7 +4603,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4619,7 +4619,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4633,7 +4633,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4647,7 +4647,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4661,7 +4661,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4670,7 +4670,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMysqlAurora { Name: *string, @@ -4727,7 +4727,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4741,7 +4741,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4755,7 +4755,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4769,7 +4769,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4783,7 +4783,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4797,7 +4797,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4811,7 +4811,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4825,7 +4825,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4839,7 +4839,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4855,7 +4855,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4869,7 +4869,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4883,7 +4883,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4897,7 +4897,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4913,7 +4913,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4927,7 +4927,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4941,7 +4941,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4955,7 +4955,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4964,7 +4964,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMysqlLegacy { Name: *string, @@ -5021,7 +5021,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5035,7 +5035,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5049,7 +5049,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5063,7 +5063,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5077,7 +5077,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5091,7 +5091,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5105,7 +5105,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5119,7 +5119,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5133,7 +5133,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5149,7 +5149,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5163,7 +5163,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5177,7 +5177,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5191,7 +5191,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5207,7 +5207,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5221,7 +5221,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5235,7 +5235,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5249,7 +5249,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5258,7 +5258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountMysqlRds { Name: *string, @@ -5315,7 +5315,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5329,7 +5329,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5343,7 +5343,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5357,7 +5357,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5371,7 +5371,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5385,7 +5385,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5399,7 +5399,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5413,7 +5413,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5427,7 +5427,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5443,7 +5443,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5457,7 +5457,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5471,7 +5471,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5485,7 +5485,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5501,7 +5501,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5515,7 +5515,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5529,7 +5529,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5543,7 +5543,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5552,7 +5552,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountOracle { Name: *string, @@ -5605,7 +5605,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5619,7 +5619,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5633,7 +5633,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5647,7 +5647,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5661,7 +5661,7 @@ DisconnectSessions interface{} Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -5675,7 +5675,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5689,7 +5689,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5703,7 +5703,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5717,7 +5717,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5733,7 +5733,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5747,7 +5747,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5761,7 +5761,7 @@ SplitStatements interface{} Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -5775,7 +5775,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5789,7 +5789,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5803,7 +5803,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5812,7 +5812,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountPostgresql { Name: *string, @@ -5867,7 +5867,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5881,7 +5881,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5895,7 +5895,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5909,7 +5909,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5923,7 +5923,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5937,7 +5937,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -5951,7 +5951,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5965,7 +5965,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5979,7 +5979,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5993,7 +5993,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6009,7 +6009,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6023,7 +6023,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6037,7 +6037,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -6051,7 +6051,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6065,7 +6065,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6079,7 +6079,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6088,7 +6088,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountRedis { Host: *string, @@ -6137,7 +6137,7 @@ Host *string Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -6151,7 +6151,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6165,7 +6165,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6179,7 +6179,7 @@ Username *string Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6193,7 +6193,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6207,7 +6207,7 @@ CaCert *string The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -6221,7 +6221,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6235,7 +6235,7 @@ InsecureTls interface{} Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -6251,7 +6251,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6265,7 +6265,7 @@ Port *f64 The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -6279,7 +6279,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6293,7 +6293,7 @@ Tls interface{} Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -6307,7 +6307,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6316,7 +6316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountRedisElasticache { Name: *string, @@ -6359,7 +6359,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6373,7 +6373,7 @@ Url *string The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -6387,7 +6387,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6401,7 +6401,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6417,7 +6417,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6433,7 +6433,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6449,7 +6449,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -6463,7 +6463,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6479,7 +6479,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6493,7 +6493,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6502,7 +6502,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountRedshift { Name: *string, @@ -6553,7 +6553,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6567,7 +6567,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6581,7 +6581,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6595,7 +6595,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6609,7 +6609,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6623,7 +6623,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6637,7 +6637,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6651,7 +6651,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6665,7 +6665,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6681,7 +6681,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6695,7 +6695,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6709,7 +6709,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6723,7 +6723,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6737,7 +6737,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6746,7 +6746,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" &databasesecretsmount.DatabaseSecretsMountSnowflake { Name: *string, @@ -6795,7 +6795,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6809,7 +6809,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6823,7 +6823,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6837,7 +6837,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6851,7 +6851,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6865,7 +6865,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6879,7 +6879,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6893,7 +6893,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6909,7 +6909,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6923,7 +6923,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6937,7 +6937,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6951,7 +6951,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6965,7 +6965,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6976,7 +6976,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountCassandraList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountCassandraList ``` @@ -7136,7 +7136,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountCassandraOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountCassandraOutputReference ``` @@ -7860,7 +7860,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountCouchbaseList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountCouchbaseList ``` @@ -8020,7 +8020,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountCouchbaseOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountCouchbaseOutputReference ``` @@ -8665,7 +8665,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountElasticsearchList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountElasticsearchList ``` @@ -8825,7 +8825,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountElasticsearchOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountElasticsearchOutputReference ``` @@ -9528,7 +9528,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountHanaList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountHanaList ``` @@ -9688,7 +9688,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountHanaOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountHanaOutputReference ``` @@ -10325,7 +10325,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountInfluxdbList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountInfluxdbList ``` @@ -10485,7 +10485,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountInfluxdbOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountInfluxdbOutputReference ``` @@ -11188,7 +11188,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMongodbatlasList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMongodbatlasList ``` @@ -11348,7 +11348,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMongodbatlasOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMongodbatlasOutputReference ``` @@ -11848,7 +11848,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMongodbList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMongodbList ``` @@ -12008,7 +12008,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMongodbOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMongodbOutputReference ``` @@ -12645,7 +12645,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMssqlList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMssqlList ``` @@ -12805,7 +12805,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMssqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMssqlOutputReference ``` @@ -13500,7 +13500,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlAuroraList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMysqlAuroraList ``` @@ -13660,7 +13660,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlAuroraOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMysqlAuroraOutputReference ``` @@ -14413,7 +14413,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlLegacyList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMysqlLegacyList ``` @@ -14573,7 +14573,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlLegacyOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMysqlLegacyOutputReference ``` @@ -15326,7 +15326,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMysqlList ``` @@ -15486,7 +15486,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMysqlOutputReference ``` @@ -16239,7 +16239,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlRdsList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountMysqlRdsList ``` @@ -16399,7 +16399,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountMysqlRdsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountMysqlRdsOutputReference ``` @@ -17152,7 +17152,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountOracleList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountOracleList ``` @@ -17312,7 +17312,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountOracleOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountOracleOutputReference ``` @@ -18007,7 +18007,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountPostgresqlList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountPostgresqlList ``` @@ -18167,7 +18167,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountPostgresqlOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountPostgresqlOutputReference ``` @@ -18891,7 +18891,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedisElasticacheList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountRedisElasticacheList ``` @@ -19051,7 +19051,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedisElasticacheOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountRedisElasticacheOutputReference ``` @@ -19594,7 +19594,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedisList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountRedisList ``` @@ -19754,7 +19754,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedisOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountRedisOutputReference ``` @@ -20370,7 +20370,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedshiftList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountRedshiftList ``` @@ -20530,7 +20530,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountRedshiftOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountRedshiftOutputReference ``` @@ -21196,7 +21196,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountSnowflakeList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) DatabaseSecretsMountSnowflakeList ``` @@ -21356,7 +21356,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/databasesecretsmount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" databasesecretsmount.NewDatabaseSecretsMountSnowflakeOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) DatabaseSecretsMountSnowflakeOutputReference ``` diff --git a/docs/databaseSecretsMount.java.md b/docs/databaseSecretsMount.java.md index 4f349d53..64f7d7e2 100644 --- a/docs/databaseSecretsMount.java.md +++ b/docs/databaseSecretsMount.java.md @@ -4,7 +4,7 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers @@ -100,7 +100,7 @@ DatabaseSecretsMount.Builder.create(Construct scope, java.lang.String id) | elasticsearch | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountElasticsearch> | elasticsearch block. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | | hana | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountHana> | hana block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | influxdb | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountInfluxdb> | influxdb block. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for tokens and secrets in seconds. | @@ -189,7 +189,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -269,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -310,7 +310,7 @@ If you experience problems setting this value it might not be settable. Please t influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -320,7 +320,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -330,7 +330,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -340,7 +340,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -350,7 +350,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -360,7 +360,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -370,7 +370,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -380,7 +380,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -390,7 +390,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -400,7 +400,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -410,7 +410,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -420,7 +420,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -430,7 +430,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -440,7 +440,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -450,7 +450,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -460,7 +460,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -470,7 +470,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -480,7 +480,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -490,7 +490,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -1361,7 +1361,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -2323,7 +2323,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2337,7 +2337,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2351,7 +2351,7 @@ public java.lang.Number getConnectTimeout(); The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -2365,7 +2365,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2379,7 +2379,7 @@ public java.util.List getHosts(); Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2393,7 +2393,7 @@ public java.lang.Object getInsecureTls(); Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2407,7 +2407,7 @@ public java.lang.String getPassword(); The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2423,7 +2423,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -2439,7 +2439,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -2455,7 +2455,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2469,7 +2469,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2483,7 +2483,7 @@ public java.lang.Number getProtocolVersion(); The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2497,7 +2497,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -2511,7 +2511,7 @@ public java.lang.Object getTls(); Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2525,7 +2525,7 @@ public java.lang.String getUsername(); The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2539,7 +2539,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2639,7 +2639,7 @@ DatabaseSecretsMountConfig.builder() | elasticsearch | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountElasticsearch> | elasticsearch block. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | | hana | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountHana> | hana block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | influxdb | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountInfluxdb> | influxdb block. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for tokens and secrets in seconds. | @@ -2742,7 +2742,7 @@ public java.lang.String getPath(); Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -2756,7 +2756,7 @@ public java.util.List getAllowedManagedKeys(); List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -2770,7 +2770,7 @@ public java.util.List getAuditNonHmacRequestKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -2784,7 +2784,7 @@ public java.util.List getAuditNonHmacResponseKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -2798,7 +2798,7 @@ public java.lang.Object getCassandra(); cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -2812,7 +2812,7 @@ public java.lang.Object getCouchbase(); couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -2826,7 +2826,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -2840,7 +2840,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -2854,7 +2854,7 @@ public java.lang.Object getElasticsearch(); elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -2868,7 +2868,7 @@ public java.lang.Object getExternalEntropyAccess(); Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -2882,7 +2882,7 @@ public java.lang.Object getHana(); hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -2894,7 +2894,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2911,7 +2911,7 @@ public java.lang.Object getInfluxdb(); influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -2925,7 +2925,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -2939,7 +2939,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -2953,7 +2953,7 @@ public java.lang.Object getMongodb(); mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -2967,7 +2967,7 @@ public java.lang.Object getMongodbatlas(); mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -2981,7 +2981,7 @@ public java.lang.Object getMssql(); mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -2995,7 +2995,7 @@ public java.lang.Object getMysql(); mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -3009,7 +3009,7 @@ public java.lang.Object getMysqlAurora(); mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -3023,7 +3023,7 @@ public java.lang.Object getMysqlLegacy(); mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -3037,7 +3037,7 @@ public java.lang.Object getMysqlRds(); mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -3051,7 +3051,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -3065,7 +3065,7 @@ public java.util.Map getOptions(); Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -3079,7 +3079,7 @@ public java.lang.Object getOracle(); oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -3093,7 +3093,7 @@ public java.lang.Object getPostgresql(); postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -3107,7 +3107,7 @@ public java.lang.Object getRedis(); redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -3121,7 +3121,7 @@ public java.lang.Object getRedisElasticache(); redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -3135,7 +3135,7 @@ public java.lang.Object getRedshift(); redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -3149,7 +3149,7 @@ public java.lang.Object getSealWrap(); Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -3163,7 +3163,7 @@ public java.lang.Object getSnowflake(); snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -3226,7 +3226,7 @@ public java.util.List getHosts(); A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -3240,7 +3240,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3254,7 +3254,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3268,7 +3268,7 @@ public java.lang.String getUsername(); Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3282,7 +3282,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3298,7 +3298,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -3312,7 +3312,7 @@ public java.lang.String getBucketName(); Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -3326,7 +3326,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3340,7 +3340,7 @@ public java.lang.Object getInsecureTls(); Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3356,7 +3356,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3370,7 +3370,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3384,7 +3384,7 @@ public java.lang.Object getTls(); Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3398,7 +3398,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3412,7 +3412,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3478,7 +3478,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3492,7 +3492,7 @@ public java.lang.String getPassword(); The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3506,7 +3506,7 @@ public java.lang.String getUrl(); The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -3520,7 +3520,7 @@ public java.lang.String getUsername(); The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3534,7 +3534,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3548,7 +3548,7 @@ public java.lang.String getCaCert(); The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -3562,7 +3562,7 @@ public java.lang.String getCaPath(); The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3576,7 +3576,7 @@ public java.lang.String getClientCert(); The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3590,7 +3590,7 @@ public java.lang.String getClientKey(); The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3604,7 +3604,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3618,7 +3618,7 @@ public java.lang.Object getInsecure(); Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -3634,7 +3634,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3648,7 +3648,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3662,7 +3662,7 @@ public java.lang.String getTlsServerName(); This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -3676,7 +3676,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3690,7 +3690,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3750,7 +3750,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3764,7 +3764,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3778,7 +3778,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3792,7 +3792,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3806,7 +3806,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -3820,7 +3820,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3834,7 +3834,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3848,7 +3848,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3862,7 +3862,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3878,7 +3878,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3892,7 +3892,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3906,7 +3906,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3920,7 +3920,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3987,7 +3987,7 @@ public java.lang.String getHost(); Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -4001,7 +4001,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4015,7 +4015,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4029,7 +4029,7 @@ public java.lang.String getUsername(); Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4043,7 +4043,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4057,7 +4057,7 @@ public java.lang.Number getConnectTimeout(); The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -4071,7 +4071,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4085,7 +4085,7 @@ public java.lang.Object getInsecureTls(); Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -4101,7 +4101,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -4117,7 +4117,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -4133,7 +4133,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4147,7 +4147,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -4161,7 +4161,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4175,7 +4175,7 @@ public java.lang.Object getTls(); Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -4189,7 +4189,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4203,7 +4203,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4262,7 +4262,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4276,7 +4276,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4290,7 +4290,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4304,7 +4304,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4318,7 +4318,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4332,7 +4332,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4346,7 +4346,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4360,7 +4360,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4376,7 +4376,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4390,7 +4390,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4404,7 +4404,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4418,7 +4418,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4432,7 +4432,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4483,7 +4483,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4497,7 +4497,7 @@ public java.lang.String getPrivateKey(); The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -4511,7 +4511,7 @@ public java.lang.String getProjectId(); The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -4525,7 +4525,7 @@ public java.lang.String getPublicKey(); The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -4539,7 +4539,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4553,7 +4553,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4569,7 +4569,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4583,7 +4583,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4597,7 +4597,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4662,7 +4662,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4676,7 +4676,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4690,7 +4690,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4704,7 +4704,7 @@ public java.lang.Object getContainedDb(); Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -4718,7 +4718,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4732,7 +4732,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4746,7 +4746,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4760,7 +4760,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4774,7 +4774,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4788,7 +4788,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4804,7 +4804,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4818,7 +4818,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4832,7 +4832,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4846,7 +4846,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4860,7 +4860,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4927,7 +4927,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4941,7 +4941,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4955,7 +4955,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4969,7 +4969,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4983,7 +4983,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4997,7 +4997,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5011,7 +5011,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5025,7 +5025,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5039,7 +5039,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5055,7 +5055,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5069,7 +5069,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5083,7 +5083,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5097,7 +5097,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5113,7 +5113,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5127,7 +5127,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5141,7 +5141,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5155,7 +5155,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5222,7 +5222,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5236,7 +5236,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5250,7 +5250,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5264,7 +5264,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5278,7 +5278,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5292,7 +5292,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5306,7 +5306,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5320,7 +5320,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5334,7 +5334,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5350,7 +5350,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5364,7 +5364,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5378,7 +5378,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5392,7 +5392,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5408,7 +5408,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5422,7 +5422,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5436,7 +5436,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5450,7 +5450,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5517,7 +5517,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5531,7 +5531,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5545,7 +5545,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5559,7 +5559,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5573,7 +5573,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5587,7 +5587,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5601,7 +5601,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5615,7 +5615,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5629,7 +5629,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5645,7 +5645,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5659,7 +5659,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5673,7 +5673,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5687,7 +5687,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5703,7 +5703,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5717,7 +5717,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5731,7 +5731,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5745,7 +5745,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5812,7 +5812,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5826,7 +5826,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5840,7 +5840,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5854,7 +5854,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5868,7 +5868,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5882,7 +5882,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5896,7 +5896,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5910,7 +5910,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5924,7 +5924,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5940,7 +5940,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5954,7 +5954,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5968,7 +5968,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5982,7 +5982,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5998,7 +5998,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -6012,7 +6012,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6026,7 +6026,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6040,7 +6040,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6105,7 +6105,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6119,7 +6119,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6133,7 +6133,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6147,7 +6147,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6161,7 +6161,7 @@ public java.lang.Object getDisconnectSessions(); Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -6175,7 +6175,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6189,7 +6189,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6203,7 +6203,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6217,7 +6217,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6233,7 +6233,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6247,7 +6247,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6261,7 +6261,7 @@ public java.lang.Object getSplitStatements(); Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -6275,7 +6275,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6289,7 +6289,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6303,7 +6303,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6369,7 +6369,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6383,7 +6383,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6397,7 +6397,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -6411,7 +6411,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6425,7 +6425,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6439,7 +6439,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6453,7 +6453,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6467,7 +6467,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6481,7 +6481,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6495,7 +6495,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6511,7 +6511,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6525,7 +6525,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6539,7 +6539,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -6553,7 +6553,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6567,7 +6567,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6581,7 +6581,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6642,7 +6642,7 @@ public java.lang.String getHost(); Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -6656,7 +6656,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6670,7 +6670,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6684,7 +6684,7 @@ public java.lang.String getUsername(); Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6698,7 +6698,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6712,7 +6712,7 @@ public java.lang.String getCaCert(); The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -6726,7 +6726,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6740,7 +6740,7 @@ public java.lang.Object getInsecureTls(); Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -6756,7 +6756,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6770,7 +6770,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -6784,7 +6784,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6798,7 +6798,7 @@ public java.lang.Object getTls(); Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -6812,7 +6812,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6865,7 +6865,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6879,7 +6879,7 @@ public java.lang.String getUrl(); The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -6893,7 +6893,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6907,7 +6907,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6923,7 +6923,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6939,7 +6939,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6955,7 +6955,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -6969,7 +6969,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6985,7 +6985,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6999,7 +6999,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7061,7 +7061,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7075,7 +7075,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7089,7 +7089,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7103,7 +7103,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7117,7 +7117,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -7131,7 +7131,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7145,7 +7145,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7159,7 +7159,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7173,7 +7173,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7189,7 +7189,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7203,7 +7203,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7217,7 +7217,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7231,7 +7231,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7245,7 +7245,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7304,7 +7304,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7318,7 +7318,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7332,7 +7332,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7346,7 +7346,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7360,7 +7360,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7374,7 +7374,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7388,7 +7388,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7402,7 +7402,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7418,7 +7418,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7432,7 +7432,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7446,7 +7446,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7460,7 +7460,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7474,7 +7474,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- diff --git a/docs/databaseSecretsMount.python.md b/docs/databaseSecretsMount.python.md index bc7d0185..213e070e 100644 --- a/docs/databaseSecretsMount.python.md +++ b/docs/databaseSecretsMount.python.md @@ -4,7 +4,7 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers @@ -77,7 +77,7 @@ databaseSecretsMount.DatabaseSecretsMount( | elasticsearch | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountElasticsearch]] | elasticsearch block. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | | hana | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountHana]] | hana block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | influxdb | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountInfluxdb]] | influxdb block. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for tokens and secrets in seconds. | @@ -166,7 +166,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -274,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -287,7 +287,7 @@ If you experience problems setting this value it might not be settable. Please t influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -307,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -317,7 +317,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -327,7 +327,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -337,7 +337,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -347,7 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -357,7 +357,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -367,7 +367,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -377,7 +377,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -387,7 +387,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -397,7 +397,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -407,7 +407,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -417,7 +417,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -427,7 +427,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -437,7 +437,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -447,7 +447,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -457,7 +457,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -467,7 +467,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -1420,7 +1420,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -2379,7 +2379,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2393,7 +2393,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2407,7 +2407,7 @@ connect_timeout: typing.Union[int, float] The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -2421,7 +2421,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2435,7 +2435,7 @@ hosts: typing.List[str] Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2449,7 +2449,7 @@ insecure_tls: typing.Union[bool, IResolvable] Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2463,7 +2463,7 @@ password: str The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2479,7 +2479,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -2495,7 +2495,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -2511,7 +2511,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2525,7 +2525,7 @@ port: typing.Union[int, float] The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2539,7 +2539,7 @@ protocol_version: typing.Union[int, float] The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2553,7 +2553,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -2567,7 +2567,7 @@ tls: typing.Union[bool, IResolvable] Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2581,7 +2581,7 @@ username: str The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2595,7 +2595,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2670,7 +2670,7 @@ databaseSecretsMount.DatabaseSecretsMountConfig( | elasticsearch | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountElasticsearch]] | elasticsearch block. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | | hana | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountHana]] | hana block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | influxdb | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountInfluxdb]] | influxdb block. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for tokens and secrets in seconds. | @@ -2773,7 +2773,7 @@ path: str Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -2787,7 +2787,7 @@ allowed_managed_keys: typing.List[str] List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -2801,7 +2801,7 @@ audit_non_hmac_request_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -2815,7 +2815,7 @@ audit_non_hmac_response_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -2829,7 +2829,7 @@ cassandra: typing.Union[IResolvable, typing.List[DatabaseSecretsMountCassandra]] cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -2843,7 +2843,7 @@ couchbase: typing.Union[IResolvable, typing.List[DatabaseSecretsMountCouchbase]] couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -2857,7 +2857,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -2871,7 +2871,7 @@ description: str Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -2885,7 +2885,7 @@ elasticsearch: typing.Union[IResolvable, typing.List[DatabaseSecretsMountElastic elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -2899,7 +2899,7 @@ external_entropy_access: typing.Union[bool, IResolvable] Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -2913,7 +2913,7 @@ hana: typing.Union[IResolvable, typing.List[DatabaseSecretsMountHana]] hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -2925,7 +2925,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2942,7 +2942,7 @@ influxdb: typing.Union[IResolvable, typing.List[DatabaseSecretsMountInfluxdb]] influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -2956,7 +2956,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -2970,7 +2970,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -2984,7 +2984,7 @@ mongodb: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMongodb]] mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -2998,7 +2998,7 @@ mongodbatlas: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMongodba mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -3012,7 +3012,7 @@ mssql: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMssql]] mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -3026,7 +3026,7 @@ mysql: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysql]] mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -3040,7 +3040,7 @@ mysql_aurora: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysqlAur mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -3054,7 +3054,7 @@ mysql_legacy: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysqlLeg mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -3068,7 +3068,7 @@ mysql_rds: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysqlRds]] mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -3082,7 +3082,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -3096,7 +3096,7 @@ options: typing.Mapping[str] Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -3110,7 +3110,7 @@ oracle: typing.Union[IResolvable, typing.List[DatabaseSecretsMountOracle]] oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -3124,7 +3124,7 @@ postgresql: typing.Union[IResolvable, typing.List[DatabaseSecretsMountPostgresql postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -3138,7 +3138,7 @@ redis: typing.Union[IResolvable, typing.List[DatabaseSecretsMountRedis]] redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -3152,7 +3152,7 @@ redis_elasticache: typing.Union[IResolvable, typing.List[DatabaseSecretsMountRed redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -3166,7 +3166,7 @@ redshift: typing.Union[IResolvable, typing.List[DatabaseSecretsMountRedshift]] redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -3180,7 +3180,7 @@ seal_wrap: typing.Union[bool, IResolvable] Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -3194,7 +3194,7 @@ snowflake: typing.Union[IResolvable, typing.List[DatabaseSecretsMountSnowflake]] snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -3254,7 +3254,7 @@ hosts: typing.List[str] A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -3268,7 +3268,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3282,7 +3282,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3296,7 +3296,7 @@ username: str Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3310,7 +3310,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3326,7 +3326,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -3340,7 +3340,7 @@ bucket_name: str Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -3354,7 +3354,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3368,7 +3368,7 @@ insecure_tls: typing.Union[bool, IResolvable] Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3384,7 +3384,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3398,7 +3398,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3412,7 +3412,7 @@ tls: typing.Union[bool, IResolvable] Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3426,7 +3426,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3440,7 +3440,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3504,7 +3504,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3518,7 +3518,7 @@ password: str The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3532,7 +3532,7 @@ url: str The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -3546,7 +3546,7 @@ username: str The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3560,7 +3560,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3574,7 +3574,7 @@ ca_cert: str The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -3588,7 +3588,7 @@ ca_path: str The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3602,7 +3602,7 @@ client_cert: str The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3616,7 +3616,7 @@ client_key: str The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3630,7 +3630,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3644,7 +3644,7 @@ insecure: typing.Union[bool, IResolvable] Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -3660,7 +3660,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3674,7 +3674,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3688,7 +3688,7 @@ tls_server_name: str This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -3702,7 +3702,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3716,7 +3716,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3774,7 +3774,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3788,7 +3788,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3802,7 +3802,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3816,7 +3816,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3830,7 +3830,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -3844,7 +3844,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3858,7 +3858,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3872,7 +3872,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3886,7 +3886,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3902,7 +3902,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3916,7 +3916,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3930,7 +3930,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3944,7 +3944,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4008,7 +4008,7 @@ host: str Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -4022,7 +4022,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4036,7 +4036,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4050,7 +4050,7 @@ username: str Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4064,7 +4064,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4078,7 +4078,7 @@ connect_timeout: typing.Union[int, float] The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -4092,7 +4092,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4106,7 +4106,7 @@ insecure_tls: typing.Union[bool, IResolvable] Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -4122,7 +4122,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -4138,7 +4138,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -4154,7 +4154,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4168,7 +4168,7 @@ port: typing.Union[int, float] The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -4182,7 +4182,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4196,7 +4196,7 @@ tls: typing.Union[bool, IResolvable] Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -4210,7 +4210,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4224,7 +4224,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4282,7 +4282,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4296,7 +4296,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4310,7 +4310,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4324,7 +4324,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4338,7 +4338,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4352,7 +4352,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4366,7 +4366,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4380,7 +4380,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4396,7 +4396,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4410,7 +4410,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4424,7 +4424,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4438,7 +4438,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4452,7 +4452,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4502,7 +4502,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4516,7 +4516,7 @@ private_key: str The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -4530,7 +4530,7 @@ project_id: str The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -4544,7 +4544,7 @@ public_key: str The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -4558,7 +4558,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4572,7 +4572,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4588,7 +4588,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4602,7 +4602,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4616,7 +4616,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4678,7 +4678,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4692,7 +4692,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4706,7 +4706,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4720,7 +4720,7 @@ contained_db: typing.Union[bool, IResolvable] Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -4734,7 +4734,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4748,7 +4748,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4762,7 +4762,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4776,7 +4776,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4790,7 +4790,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4804,7 +4804,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4820,7 +4820,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4834,7 +4834,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4848,7 +4848,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4862,7 +4862,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4876,7 +4876,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4942,7 +4942,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4956,7 +4956,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4970,7 +4970,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4984,7 +4984,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4998,7 +4998,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5012,7 +5012,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5026,7 +5026,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5040,7 +5040,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5054,7 +5054,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5070,7 +5070,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5084,7 +5084,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5098,7 +5098,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5112,7 +5112,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5128,7 +5128,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5142,7 +5142,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5156,7 +5156,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5170,7 +5170,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5236,7 +5236,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5250,7 +5250,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5264,7 +5264,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5278,7 +5278,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5292,7 +5292,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5306,7 +5306,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5320,7 +5320,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5334,7 +5334,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5348,7 +5348,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5364,7 +5364,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5378,7 +5378,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5392,7 +5392,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5406,7 +5406,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5422,7 +5422,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5436,7 +5436,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5450,7 +5450,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5464,7 +5464,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5530,7 +5530,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5544,7 +5544,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5558,7 +5558,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5572,7 +5572,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5586,7 +5586,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5600,7 +5600,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5614,7 +5614,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5628,7 +5628,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5642,7 +5642,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5658,7 +5658,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5672,7 +5672,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5686,7 +5686,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5700,7 +5700,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5716,7 +5716,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5730,7 +5730,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5744,7 +5744,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5758,7 +5758,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5824,7 +5824,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5838,7 +5838,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5852,7 +5852,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5866,7 +5866,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5880,7 +5880,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5894,7 +5894,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5908,7 +5908,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5922,7 +5922,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5936,7 +5936,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5952,7 +5952,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5966,7 +5966,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5980,7 +5980,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5994,7 +5994,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -6010,7 +6010,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -6024,7 +6024,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6038,7 +6038,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6052,7 +6052,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6114,7 +6114,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6128,7 +6128,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6142,7 +6142,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6156,7 +6156,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6170,7 +6170,7 @@ disconnect_sessions: typing.Union[bool, IResolvable] Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -6184,7 +6184,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6198,7 +6198,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6212,7 +6212,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6226,7 +6226,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6242,7 +6242,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6256,7 +6256,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6270,7 +6270,7 @@ split_statements: typing.Union[bool, IResolvable] Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -6284,7 +6284,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6298,7 +6298,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6312,7 +6312,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6376,7 +6376,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6390,7 +6390,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6404,7 +6404,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -6418,7 +6418,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6432,7 +6432,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6446,7 +6446,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6460,7 +6460,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6474,7 +6474,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6488,7 +6488,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6502,7 +6502,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6518,7 +6518,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6532,7 +6532,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6546,7 +6546,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -6560,7 +6560,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6574,7 +6574,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6588,7 +6588,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6646,7 +6646,7 @@ host: str Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -6660,7 +6660,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6674,7 +6674,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6688,7 +6688,7 @@ username: str Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6702,7 +6702,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6716,7 +6716,7 @@ ca_cert: str The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -6730,7 +6730,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6744,7 +6744,7 @@ insecure_tls: typing.Union[bool, IResolvable] Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -6760,7 +6760,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6774,7 +6774,7 @@ port: typing.Union[int, float] The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -6788,7 +6788,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6802,7 +6802,7 @@ tls: typing.Union[bool, IResolvable] Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -6816,7 +6816,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6868,7 +6868,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6882,7 +6882,7 @@ url: str The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -6896,7 +6896,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6910,7 +6910,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6926,7 +6926,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6942,7 +6942,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6958,7 +6958,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -6972,7 +6972,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6988,7 +6988,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7002,7 +7002,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7062,7 +7062,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7076,7 +7076,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7090,7 +7090,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7104,7 +7104,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7118,7 +7118,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -7132,7 +7132,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7146,7 +7146,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7160,7 +7160,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7174,7 +7174,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7190,7 +7190,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7204,7 +7204,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7218,7 +7218,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7232,7 +7232,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7246,7 +7246,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7304,7 +7304,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7318,7 +7318,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7332,7 +7332,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7346,7 +7346,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7360,7 +7360,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7374,7 +7374,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7388,7 +7388,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7402,7 +7402,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7418,7 +7418,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7432,7 +7432,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7446,7 +7446,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7460,7 +7460,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7474,7 +7474,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- diff --git a/docs/databaseSecretsMount.typescript.md b/docs/databaseSecretsMount.typescript.md index 4b97f0c5..d9878e64 100644 --- a/docs/databaseSecretsMount.typescript.md +++ b/docs/databaseSecretsMount.typescript.md @@ -4,7 +4,7 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers @@ -911,7 +911,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -1853,7 +1853,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -1867,7 +1867,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -1881,7 +1881,7 @@ public readonly connectTimeout: number; The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -1895,7 +1895,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -1909,7 +1909,7 @@ public readonly hosts: string[]; Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -1923,7 +1923,7 @@ public readonly insecureTls: boolean | IResolvable; Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -1937,7 +1937,7 @@ public readonly password: string; The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -1953,7 +1953,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -1969,7 +1969,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -1985,7 +1985,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -1999,7 +1999,7 @@ public readonly port: number; The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2013,7 +2013,7 @@ public readonly protocolVersion: number; The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2027,7 +2027,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -2041,7 +2041,7 @@ public readonly tls: boolean | IResolvable; Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2055,7 +2055,7 @@ public readonly username: string; The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2069,7 +2069,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2105,7 +2105,7 @@ const databaseSecretsMountConfig: databaseSecretsMount.DatabaseSecretsMountConfi | elasticsearch | cdktf.IResolvable \| DatabaseSecretsMountElasticsearch[] | elasticsearch block. | | externalEntropyAccess | boolean \| cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | | hana | cdktf.IResolvable \| DatabaseSecretsMountHana[] | hana block. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | influxdb | cdktf.IResolvable \| DatabaseSecretsMountInfluxdb[] | influxdb block. | | local | boolean \| cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for tokens and secrets in seconds. | @@ -2208,7 +2208,7 @@ public readonly path: string; Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -2222,7 +2222,7 @@ public readonly allowedManagedKeys: string[]; List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -2236,7 +2236,7 @@ public readonly auditNonHmacRequestKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -2250,7 +2250,7 @@ public readonly auditNonHmacResponseKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -2264,7 +2264,7 @@ public readonly cassandra: IResolvable | DatabaseSecretsMountCassandra[]; cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -2278,7 +2278,7 @@ public readonly couchbase: IResolvable | DatabaseSecretsMountCouchbase[]; couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -2292,7 +2292,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -2306,7 +2306,7 @@ public readonly description: string; Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -2320,7 +2320,7 @@ public readonly elasticsearch: IResolvable | DatabaseSecretsMountElasticsearch[] elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -2334,7 +2334,7 @@ public readonly externalEntropyAccess: boolean | IResolvable; Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -2348,7 +2348,7 @@ public readonly hana: IResolvable | DatabaseSecretsMountHana[]; hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -2360,7 +2360,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2377,7 +2377,7 @@ public readonly influxdb: IResolvable | DatabaseSecretsMountInfluxdb[]; influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -2391,7 +2391,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -2405,7 +2405,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -2419,7 +2419,7 @@ public readonly mongodb: IResolvable | DatabaseSecretsMountMongodb[]; mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -2433,7 +2433,7 @@ public readonly mongodbatlas: IResolvable | DatabaseSecretsMountMongodbatlas[]; mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -2447,7 +2447,7 @@ public readonly mssql: IResolvable | DatabaseSecretsMountMssql[]; mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -2461,7 +2461,7 @@ public readonly mysql: IResolvable | DatabaseSecretsMountMysql[]; mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -2475,7 +2475,7 @@ public readonly mysqlAurora: IResolvable | DatabaseSecretsMountMysqlAurora[]; mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -2489,7 +2489,7 @@ public readonly mysqlLegacy: IResolvable | DatabaseSecretsMountMysqlLegacy[]; mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -2503,7 +2503,7 @@ public readonly mysqlRds: IResolvable | DatabaseSecretsMountMysqlRds[]; mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -2517,7 +2517,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -2531,7 +2531,7 @@ public readonly options: {[ key: string ]: string}; Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -2545,7 +2545,7 @@ public readonly oracle: IResolvable | DatabaseSecretsMountOracle[]; oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -2559,7 +2559,7 @@ public readonly postgresql: IResolvable | DatabaseSecretsMountPostgresql[]; postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -2573,7 +2573,7 @@ public readonly redis: IResolvable | DatabaseSecretsMountRedis[]; redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -2587,7 +2587,7 @@ public readonly redisElasticache: IResolvable | DatabaseSecretsMountRedisElastic redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -2601,7 +2601,7 @@ public readonly redshift: IResolvable | DatabaseSecretsMountRedshift[]; redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -2615,7 +2615,7 @@ public readonly sealWrap: boolean | IResolvable; Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -2629,7 +2629,7 @@ public readonly snowflake: IResolvable | DatabaseSecretsMountSnowflake[]; snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -2674,7 +2674,7 @@ public readonly hosts: string[]; A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2688,7 +2688,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2702,7 +2702,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2716,7 +2716,7 @@ public readonly username: string; Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2730,7 +2730,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2746,7 +2746,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -2760,7 +2760,7 @@ public readonly bucketName: string; Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -2774,7 +2774,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2788,7 +2788,7 @@ public readonly insecureTls: boolean | IResolvable; Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2804,7 +2804,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2818,7 +2818,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -2832,7 +2832,7 @@ public readonly tls: boolean | IResolvable; Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2846,7 +2846,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -2860,7 +2860,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2907,7 +2907,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2921,7 +2921,7 @@ public readonly password: string; The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2935,7 +2935,7 @@ public readonly url: string; The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -2949,7 +2949,7 @@ public readonly username: string; The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2963,7 +2963,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2977,7 +2977,7 @@ public readonly caCert: string; The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -2991,7 +2991,7 @@ public readonly caPath: string; The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3005,7 +3005,7 @@ public readonly clientCert: string; The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3019,7 +3019,7 @@ public readonly clientKey: string; The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3033,7 +3033,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3047,7 +3047,7 @@ public readonly insecure: boolean | IResolvable; Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -3063,7 +3063,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3077,7 +3077,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3091,7 +3091,7 @@ public readonly tlsServerName: string; This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -3105,7 +3105,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3119,7 +3119,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3163,7 +3163,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3177,7 +3177,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3191,7 +3191,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3205,7 +3205,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3219,7 +3219,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -3233,7 +3233,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3247,7 +3247,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3261,7 +3261,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3275,7 +3275,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3291,7 +3291,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3305,7 +3305,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3319,7 +3319,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3333,7 +3333,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3380,7 +3380,7 @@ public readonly host: string; Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -3394,7 +3394,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3408,7 +3408,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3422,7 +3422,7 @@ public readonly username: string; Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3436,7 +3436,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3450,7 +3450,7 @@ public readonly connectTimeout: number; The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -3464,7 +3464,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3478,7 +3478,7 @@ public readonly insecureTls: boolean | IResolvable; Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3494,7 +3494,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -3510,7 +3510,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -3526,7 +3526,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3540,7 +3540,7 @@ public readonly port: number; The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -3554,7 +3554,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3568,7 +3568,7 @@ public readonly tls: boolean | IResolvable; Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3582,7 +3582,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3596,7 +3596,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3640,7 +3640,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3654,7 +3654,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3668,7 +3668,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3682,7 +3682,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3696,7 +3696,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3710,7 +3710,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3724,7 +3724,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3738,7 +3738,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3754,7 +3754,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3768,7 +3768,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3782,7 +3782,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3796,7 +3796,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3810,7 +3810,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3850,7 +3850,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3864,7 +3864,7 @@ public readonly privateKey: string; The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -3878,7 +3878,7 @@ public readonly projectId: string; The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -3892,7 +3892,7 @@ public readonly publicKey: string; The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -3906,7 +3906,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3920,7 +3920,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3936,7 +3936,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3950,7 +3950,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3964,7 +3964,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4010,7 +4010,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4024,7 +4024,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4038,7 +4038,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4052,7 +4052,7 @@ public readonly containedDb: boolean | IResolvable; Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -4066,7 +4066,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4080,7 +4080,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4094,7 +4094,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4108,7 +4108,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4122,7 +4122,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4136,7 +4136,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4152,7 +4152,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4166,7 +4166,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4180,7 +4180,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4194,7 +4194,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4208,7 +4208,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4256,7 +4256,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4270,7 +4270,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4284,7 +4284,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4298,7 +4298,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4312,7 +4312,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4326,7 +4326,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4340,7 +4340,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4354,7 +4354,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4368,7 +4368,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4384,7 +4384,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4398,7 +4398,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4412,7 +4412,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4426,7 +4426,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4442,7 +4442,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4456,7 +4456,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4470,7 +4470,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4484,7 +4484,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4532,7 +4532,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4546,7 +4546,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4560,7 +4560,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4574,7 +4574,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4588,7 +4588,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4602,7 +4602,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4616,7 +4616,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4630,7 +4630,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4644,7 +4644,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4660,7 +4660,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4674,7 +4674,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4688,7 +4688,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4702,7 +4702,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4718,7 +4718,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4732,7 +4732,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4746,7 +4746,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4760,7 +4760,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4808,7 +4808,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4822,7 +4822,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4836,7 +4836,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4850,7 +4850,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4864,7 +4864,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4878,7 +4878,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4892,7 +4892,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4906,7 +4906,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4920,7 +4920,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4936,7 +4936,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4950,7 +4950,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4964,7 +4964,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4978,7 +4978,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4994,7 +4994,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5008,7 +5008,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5022,7 +5022,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5036,7 +5036,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5084,7 +5084,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5098,7 +5098,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5112,7 +5112,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5126,7 +5126,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5140,7 +5140,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5154,7 +5154,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5168,7 +5168,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5182,7 +5182,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5196,7 +5196,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5212,7 +5212,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5226,7 +5226,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5240,7 +5240,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5254,7 +5254,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5270,7 +5270,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5284,7 +5284,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5298,7 +5298,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5312,7 +5312,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5358,7 +5358,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5372,7 +5372,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5386,7 +5386,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5400,7 +5400,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5414,7 +5414,7 @@ public readonly disconnectSessions: boolean | IResolvable; Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -5428,7 +5428,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5442,7 +5442,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5456,7 +5456,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5470,7 +5470,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5486,7 +5486,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5500,7 +5500,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5514,7 +5514,7 @@ public readonly splitStatements: boolean | IResolvable; Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -5528,7 +5528,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5542,7 +5542,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5556,7 +5556,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5603,7 +5603,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5617,7 +5617,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5631,7 +5631,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5645,7 +5645,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5659,7 +5659,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5673,7 +5673,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -5687,7 +5687,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5701,7 +5701,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5715,7 +5715,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5729,7 +5729,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5745,7 +5745,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5759,7 +5759,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5773,7 +5773,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5787,7 +5787,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5801,7 +5801,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5815,7 +5815,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5859,7 +5859,7 @@ public readonly host: string; Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -5873,7 +5873,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5887,7 +5887,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5901,7 +5901,7 @@ public readonly username: string; Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5915,7 +5915,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5929,7 +5929,7 @@ public readonly caCert: string; The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -5943,7 +5943,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5957,7 +5957,7 @@ public readonly insecureTls: boolean | IResolvable; Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -5973,7 +5973,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5987,7 +5987,7 @@ public readonly port: number; The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -6001,7 +6001,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6015,7 +6015,7 @@ public readonly tls: boolean | IResolvable; Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -6029,7 +6029,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6070,7 +6070,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6084,7 +6084,7 @@ public readonly url: string; The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -6098,7 +6098,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6112,7 +6112,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6128,7 +6128,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6144,7 +6144,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6160,7 +6160,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -6174,7 +6174,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6190,7 +6190,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6204,7 +6204,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6249,7 +6249,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6263,7 +6263,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6277,7 +6277,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6291,7 +6291,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6305,7 +6305,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6319,7 +6319,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6333,7 +6333,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6347,7 +6347,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6361,7 +6361,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6377,7 +6377,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6391,7 +6391,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6405,7 +6405,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6419,7 +6419,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6433,7 +6433,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6477,7 +6477,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6491,7 +6491,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6505,7 +6505,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6519,7 +6519,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6533,7 +6533,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6547,7 +6547,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6561,7 +6561,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6575,7 +6575,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6591,7 +6591,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6605,7 +6605,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6619,7 +6619,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6633,7 +6633,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6647,7 +6647,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- diff --git a/docs/egpPolicy.csharp.md b/docs/egpPolicy.csharp.md index 74c220d4..6814ff1b 100644 --- a/docs/egpPolicy.csharp.md +++ b/docs/egpPolicy.csharp.md @@ -4,7 +4,7 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -847,7 +847,7 @@ new EgpPolicyConfig { | Name | string | Name of the policy. | | Paths | string[] | List of paths to which the policy will be applied. | | Policy | string | The policy document. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -932,7 +932,7 @@ public string EnforcementLevel { get; set; } Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -946,7 +946,7 @@ public string Name { get; set; } Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -960,7 +960,7 @@ public string[] Paths { get; set; } List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -974,7 +974,7 @@ public string Policy { get; set; } The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -986,7 +986,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/egpPolicy.go.md b/docs/egpPolicy.go.md index dc6df7c7..841bbd1d 100644 --- a/docs/egpPolicy.go.md +++ b/docs/egpPolicy.go.md @@ -4,12 +4,12 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/egppolicy" egppolicy.NewEgpPolicy(scope Construct, id *string, config EgpPolicyConfig) EgpPolicy ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/egppolicy" egppolicy.EgpPolicy_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/egppolicy" egppolicy.EgpPolicy_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ egppolicy.EgpPolicy_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/egppolicy" egppolicy.EgpPolicy_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ egppolicy.EgpPolicy_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/egppolicy" egppolicy.EgpPolicy_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -813,7 +813,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/egppolicy" &egppolicy.EgpPolicyConfig { Connection: interface{}, @@ -847,7 +847,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/egppolicy" | Name | *string | Name of the policy. | | Paths | *[]*string | List of paths to which the policy will be applied. | | Policy | *string | The policy document. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -932,7 +932,7 @@ EnforcementLevel *string Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -946,7 +946,7 @@ Name *string Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -960,7 +960,7 @@ Paths *[]*string List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -974,7 +974,7 @@ Policy *string The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -986,7 +986,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/egpPolicy.java.md b/docs/egpPolicy.java.md index 035bd420..405eac23 100644 --- a/docs/egpPolicy.java.md +++ b/docs/egpPolicy.java.md @@ -4,7 +4,7 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers @@ -47,7 +47,7 @@ EgpPolicy.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Name of the policy. | | paths | java.util.List | List of paths to which the policy will be applied. | | policy | java.lang.String | The policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- @@ -610,7 +610,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ EgpPolicyConfig.builder() | name | java.lang.String | Name of the policy. | | paths | java.util.List | List of paths to which the policy will be applied. | | policy | java.lang.String | The policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1065,7 +1065,7 @@ public java.lang.String getEnforcementLevel(); Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -1079,7 +1079,7 @@ public java.lang.String getName(); Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -1093,7 +1093,7 @@ public java.util.List getPaths(); List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -1107,7 +1107,7 @@ public java.lang.String getPolicy(); The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -1119,7 +1119,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/egpPolicy.python.md b/docs/egpPolicy.python.md index d532f962..038430ce 100644 --- a/docs/egpPolicy.python.md +++ b/docs/egpPolicy.python.md @@ -4,7 +4,7 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers @@ -45,7 +45,7 @@ egpPolicy.EgpPolicy( | name | str | Name of the policy. | | paths | typing.List[str] | List of paths to which the policy will be applied. | | policy | str | The policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- @@ -654,7 +654,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -1020,7 +1020,7 @@ egpPolicy.EgpPolicyConfig( | name | str | Name of the policy. | | paths | typing.List[str] | List of paths to which the policy will be applied. | | policy | str | The policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1105,7 +1105,7 @@ enforcement_level: str Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -1119,7 +1119,7 @@ name: str Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -1133,7 +1133,7 @@ paths: typing.List[str] List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -1147,7 +1147,7 @@ policy: str The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -1159,7 +1159,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1176,7 +1176,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/egpPolicy.typescript.md b/docs/egpPolicy.typescript.md index 8859c2ee..1e171d16 100644 --- a/docs/egpPolicy.typescript.md +++ b/docs/egpPolicy.typescript.md @@ -4,7 +4,7 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -833,7 +833,7 @@ const egpPolicyConfig: egpPolicy.EgpPolicyConfig = { ... } | name | string | Name of the policy. | | paths | string[] | List of paths to which the policy will be applied. | | policy | string | The policy document. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -918,7 +918,7 @@ public readonly enforcementLevel: string; Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -932,7 +932,7 @@ public readonly name: string; Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -946,7 +946,7 @@ public readonly paths: string[]; List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -960,7 +960,7 @@ public readonly policy: string; The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -972,7 +972,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/gcpAuthBackend.csharp.md b/docs/gcpAuthBackend.csharp.md index 2b4f55c5..705405e9 100644 --- a/docs/gcpAuthBackend.csharp.md +++ b/docs/gcpAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers @@ -584,7 +584,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1118,19 +1118,19 @@ new GcpAuthBackendConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| ClientEmail | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| ClientId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| Credentials | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| ClientEmail | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| ClientId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| Credentials | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | CustomEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | Local | object | Specifies if the auth method is local only. | | Namespace | string | Target namespace. (requires Enterprise). | -| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| PrivateKeyId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| ProjectId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | -| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| PrivateKeyId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| ProjectId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1212,7 +1212,7 @@ public string ClientEmail { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1224,7 +1224,7 @@ public string ClientId { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1236,7 +1236,7 @@ public string Credentials { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1250,7 +1250,7 @@ public GcpAuthBackendCustomEndpoint CustomEndpoint { get; set; } custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1262,7 +1262,7 @@ public string Description { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1276,7 +1276,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1288,7 +1288,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1305,7 +1305,7 @@ public object Local { get; set; } Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1319,7 +1319,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1331,7 +1331,7 @@ public string Path { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1343,7 +1343,7 @@ public string PrivateKeyId { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1355,7 +1355,7 @@ public string ProjectId { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1367,7 +1367,7 @@ public object Tune { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1407,7 +1407,7 @@ public string Api { get; set; } Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1421,7 +1421,7 @@ public string Compute { get; set; } Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1435,7 +1435,7 @@ public string Crm { get; set; } Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1449,7 +1449,7 @@ public string Iam { get; set; } Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1476,14 +1476,14 @@ new GcpAuthBackendTune { | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -1495,7 +1495,7 @@ public string[] AllowedResponseHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -1507,7 +1507,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -1519,7 +1519,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -1531,7 +1531,7 @@ public string DefaultLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -1543,7 +1543,7 @@ public string ListingVisibility { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -1555,7 +1555,7 @@ public string MaxLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -1567,7 +1567,7 @@ public string[] PassthroughRequestHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -1579,7 +1579,7 @@ public string TokenType { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- diff --git a/docs/gcpAuthBackend.go.md b/docs/gcpAuthBackend.go.md index 7b630b37..34dc370e 100644 --- a/docs/gcpAuthBackend.go.md +++ b/docs/gcpAuthBackend.go.md @@ -4,12 +4,12 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" gcpauthbackend.NewGcpAuthBackend(scope Construct, id *string, config GcpAuthBackendConfig) GcpAuthBackend ``` @@ -495,7 +495,7 @@ func ResetTune() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" gcpauthbackend.GcpAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -527,7 +527,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" gcpauthbackend.GcpAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -541,7 +541,7 @@ gcpauthbackend.GcpAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" gcpauthbackend.GcpAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -555,7 +555,7 @@ gcpauthbackend.GcpAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" gcpauthbackend.GcpAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -584,7 +584,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1081,7 +1081,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" &gcpauthbackend.GcpAuthBackendConfig { Connection: interface{}, @@ -1094,7 +1094,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" ClientEmail: *string, ClientId: *string, Credentials: *string, - CustomEndpoint: github.com/cdktf/cdktf-provider-vault-go/vault/v12.gcpAuthBackend.GcpAuthBackendCustomEndpoint, + CustomEndpoint: github.com/cdktf/cdktf-provider-vault-go/vault/v13.gcpAuthBackend.GcpAuthBackendCustomEndpoint, Description: *string, DisableRemount: interface{}, Id: *string, @@ -1118,19 +1118,19 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| ClientEmail | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| ClientId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| Credentials | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| ClientEmail | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| ClientId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| Credentials | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | CustomEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | Local | interface{} | Specifies if the auth method is local only. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| PrivateKeyId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| ProjectId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | -| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| PrivateKeyId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| ProjectId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1212,7 +1212,7 @@ ClientEmail *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1224,7 +1224,7 @@ ClientId *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1236,7 +1236,7 @@ Credentials *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1250,7 +1250,7 @@ CustomEndpoint GcpAuthBackendCustomEndpoint custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1262,7 +1262,7 @@ Description *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1276,7 +1276,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1288,7 +1288,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1305,7 +1305,7 @@ Local interface{} Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1319,7 +1319,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1331,7 +1331,7 @@ Path *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1343,7 +1343,7 @@ PrivateKeyId *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1355,7 +1355,7 @@ ProjectId *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1367,7 +1367,7 @@ Tune interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1376,7 +1376,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" &gcpauthbackend.GcpAuthBackendCustomEndpoint { Api: *string, @@ -1407,7 +1407,7 @@ Api *string Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1421,7 +1421,7 @@ Compute *string Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1435,7 +1435,7 @@ Crm *string Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1449,7 +1449,7 @@ Iam *string Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1458,7 +1458,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" &gcpauthbackend.GcpAuthBackendTune { AllowedResponseHeaders: *[]*string, @@ -1476,14 +1476,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -1495,7 +1495,7 @@ AllowedResponseHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -1507,7 +1507,7 @@ AuditNonHmacRequestKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -1519,7 +1519,7 @@ AuditNonHmacResponseKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -1531,7 +1531,7 @@ DefaultLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -1543,7 +1543,7 @@ ListingVisibility *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -1555,7 +1555,7 @@ MaxLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -1567,7 +1567,7 @@ PassthroughRequestHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -1579,7 +1579,7 @@ TokenType *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- @@ -1590,7 +1590,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" gcpauthbackend.NewGcpAuthBackendCustomEndpointOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) GcpAuthBackendCustomEndpointOutputReference ``` @@ -1955,7 +1955,7 @@ func InternalValue() GcpAuthBackendCustomEndpoint #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" gcpauthbackend.NewGcpAuthBackendTuneList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) GcpAuthBackendTuneList ``` @@ -2115,7 +2115,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" gcpauthbackend.NewGcpAuthBackendTuneOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) GcpAuthBackendTuneOutputReference ``` diff --git a/docs/gcpAuthBackend.java.md b/docs/gcpAuthBackend.java.md index debfae1e..730e75a4 100644 --- a/docs/gcpAuthBackend.java.md +++ b/docs/gcpAuthBackend.java.md @@ -4,7 +4,7 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers @@ -53,19 +53,19 @@ GcpAuthBackend.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| clientEmail | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| clientId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| clientEmail | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| clientId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | customEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| privateKeyId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| projectId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| privateKeyId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| projectId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -133,7 +133,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -198,7 +198,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -224,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -240,7 +240,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -784,7 +784,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1325,19 +1325,19 @@ GcpAuthBackendConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| clientEmail | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| clientId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| clientEmail | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| clientId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | customEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| privateKeyId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| projectId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| privateKeyId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| projectId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1419,7 +1419,7 @@ public java.lang.String getClientEmail(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1431,7 +1431,7 @@ public java.lang.String getClientId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1443,7 +1443,7 @@ public java.lang.String getCredentials(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1457,7 +1457,7 @@ public GcpAuthBackendCustomEndpoint getCustomEndpoint(); custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1469,7 +1469,7 @@ public java.lang.String getDescription(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1483,7 +1483,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1495,7 +1495,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1512,7 +1512,7 @@ public java.lang.Object getLocal(); Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1526,7 +1526,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1538,7 +1538,7 @@ public java.lang.String getPath(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1550,7 +1550,7 @@ public java.lang.String getPrivateKeyId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1562,7 +1562,7 @@ public java.lang.String getProjectId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1574,7 +1574,7 @@ public java.lang.Object getTune(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1614,7 +1614,7 @@ public java.lang.String getApi(); Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1628,7 +1628,7 @@ public java.lang.String getCompute(); Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1642,7 +1642,7 @@ public java.lang.String getCrm(); Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1656,7 +1656,7 @@ public java.lang.String getIam(); Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1683,14 +1683,14 @@ GcpAuthBackendTune.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -1702,7 +1702,7 @@ public java.util.List getAllowedResponseHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -1714,7 +1714,7 @@ public java.util.List getAuditNonHmacRequestKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -1726,7 +1726,7 @@ public java.util.List getAuditNonHmacResponseKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -1738,7 +1738,7 @@ public java.lang.String getDefaultLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -1750,7 +1750,7 @@ public java.lang.String getListingVisibility(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -1762,7 +1762,7 @@ public java.lang.String getMaxLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -1774,7 +1774,7 @@ public java.util.List getPassthroughRequestHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -1786,7 +1786,7 @@ public java.lang.String getTokenType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- diff --git a/docs/gcpAuthBackend.python.md b/docs/gcpAuthBackend.python.md index 3f08fd15..fe6440a2 100644 --- a/docs/gcpAuthBackend.python.md +++ b/docs/gcpAuthBackend.python.md @@ -4,7 +4,7 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers @@ -48,19 +48,19 @@ gcpAuthBackend.GcpAuthBackend( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| client_email | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| client_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| client_email | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| client_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | custom_endpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | | namespace | str | Target namespace. (requires Enterprise). | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| private_key_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| project_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | -| tune | typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| private_key_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| project_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -193,7 +193,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -626,7 +626,7 @@ def put_custom_endpoint( Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -636,7 +636,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -646,7 +646,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -656,7 +656,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -866,7 +866,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1400,19 +1400,19 @@ gcpAuthBackend.GcpAuthBackendConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| client_email | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| client_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| client_email | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| client_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | custom_endpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | | namespace | str | Target namespace. (requires Enterprise). | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| private_key_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| project_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | -| tune | typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| private_key_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| project_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1494,7 +1494,7 @@ client_email: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1506,7 +1506,7 @@ client_id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1518,7 +1518,7 @@ credentials: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1532,7 +1532,7 @@ custom_endpoint: GcpAuthBackendCustomEndpoint custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1544,7 +1544,7 @@ description: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1558,7 +1558,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1570,7 +1570,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1587,7 +1587,7 @@ local: typing.Union[bool, IResolvable] Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1601,7 +1601,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1613,7 +1613,7 @@ path: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1625,7 +1625,7 @@ private_key_id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1637,7 +1637,7 @@ project_id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1649,7 +1649,7 @@ tune: typing.Union[IResolvable, typing.List[GcpAuthBackendTune]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1689,7 +1689,7 @@ api: str Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1703,7 +1703,7 @@ compute: str Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1717,7 +1717,7 @@ crm: str Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1731,7 +1731,7 @@ iam: str Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1758,14 +1758,14 @@ gcpAuthBackend.GcpAuthBackendTune( | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -1777,7 +1777,7 @@ allowed_response_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -1789,7 +1789,7 @@ audit_non_hmac_request_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -1801,7 +1801,7 @@ audit_non_hmac_response_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -1813,7 +1813,7 @@ default_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -1825,7 +1825,7 @@ listing_visibility: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -1837,7 +1837,7 @@ max_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -1849,7 +1849,7 @@ passthrough_request_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -1861,7 +1861,7 @@ token_type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- diff --git a/docs/gcpAuthBackend.typescript.md b/docs/gcpAuthBackend.typescript.md index 006630c5..21a4697a 100644 --- a/docs/gcpAuthBackend.typescript.md +++ b/docs/gcpAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers @@ -584,7 +584,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1097,19 +1097,19 @@ const gcpAuthBackendConfig: gcpAuthBackend.GcpAuthBackendConfig = { ... } | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| clientEmail | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| clientId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| clientEmail | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| clientId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | customEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | local | boolean \| cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | string | Target namespace. (requires Enterprise). | -| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| privateKeyId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| projectId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | -| tune | cdktf.IResolvable \| GcpAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| privateKeyId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| projectId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| tune | cdktf.IResolvable \| GcpAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1191,7 +1191,7 @@ public readonly clientEmail: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1203,7 +1203,7 @@ public readonly clientId: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1215,7 +1215,7 @@ public readonly credentials: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1229,7 +1229,7 @@ public readonly customEndpoint: GcpAuthBackendCustomEndpoint; custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1241,7 +1241,7 @@ public readonly description: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1255,7 +1255,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1267,7 +1267,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1284,7 +1284,7 @@ public readonly local: boolean | IResolvable; Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1298,7 +1298,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1310,7 +1310,7 @@ public readonly path: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1322,7 +1322,7 @@ public readonly privateKeyId: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1334,7 +1334,7 @@ public readonly projectId: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1346,7 +1346,7 @@ public readonly tune: IResolvable | GcpAuthBackendTune[]; - *Type:* cdktf.IResolvable | GcpAuthBackendTune[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1381,7 +1381,7 @@ public readonly api: string; Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1395,7 +1395,7 @@ public readonly compute: string; Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1409,7 +1409,7 @@ public readonly crm: string; Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1423,7 +1423,7 @@ public readonly iam: string; Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1441,14 +1441,14 @@ const gcpAuthBackendTune: gcpAuthBackend.GcpAuthBackendTune = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -1460,7 +1460,7 @@ public readonly allowedResponseHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -1472,7 +1472,7 @@ public readonly auditNonHmacRequestKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -1484,7 +1484,7 @@ public readonly auditNonHmacResponseKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -1496,7 +1496,7 @@ public readonly defaultLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -1508,7 +1508,7 @@ public readonly listingVisibility: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -1520,7 +1520,7 @@ public readonly maxLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -1532,7 +1532,7 @@ public readonly passthroughRequestHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -1544,7 +1544,7 @@ public readonly tokenType: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- diff --git a/docs/gcpAuthBackendRole.csharp.md b/docs/gcpAuthBackendRole.csharp.md index 108a8205..cced9eaf 100644 --- a/docs/gcpAuthBackendRole.csharp.md +++ b/docs/gcpAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -614,7 +614,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1367,19 +1367,19 @@ new GcpAuthBackendRoleConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Role | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| Type | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| AddGroupAliases | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| AllowGceInference | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| BoundInstanceGroups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| BoundLabels | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| BoundProjects | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| BoundRegions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| BoundServiceAccounts | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| BoundZones | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| MaxJwtExp | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| Role | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| Type | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| AddGroupAliases | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| AllowGceInference | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| BoundInstanceGroups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| BoundLabels | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| BoundProjects | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| BoundRegions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| BoundServiceAccounts | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| BoundZones | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| MaxJwtExp | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1471,7 +1471,7 @@ public string Role { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1483,7 +1483,7 @@ public string Type { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1495,7 +1495,7 @@ public object AddGroupAliases { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1507,7 +1507,7 @@ public object AllowGceInference { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1519,7 +1519,7 @@ public string Backend { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1531,7 +1531,7 @@ public string[] BoundInstanceGroups { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1543,7 +1543,7 @@ public string[] BoundLabels { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1555,7 +1555,7 @@ public string[] BoundProjects { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1567,7 +1567,7 @@ public string[] BoundRegions { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1579,7 +1579,7 @@ public string[] BoundServiceAccounts { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1591,7 +1591,7 @@ public string[] BoundZones { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1603,7 +1603,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1618,7 +1618,7 @@ public string MaxJwtExp { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1632,7 +1632,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1646,7 +1646,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -1660,7 +1660,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1674,7 +1674,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -1688,7 +1688,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -1702,7 +1702,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -1716,7 +1716,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -1730,7 +1730,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -1744,7 +1744,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -1758,7 +1758,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpAuthBackendRole.go.md b/docs/gcpAuthBackendRole.go.md index d2857e52..7edfc634 100644 --- a/docs/gcpAuthBackendRole.go.md +++ b/docs/gcpAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackendrole" gcpauthbackendrole.NewGcpAuthBackendRole(scope Construct, id *string, config GcpAuthBackendRoleConfig) GcpAuthBackendRole ``` @@ -525,7 +525,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackendrole" gcpauthbackendrole.GcpAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -557,7 +557,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackendrole" gcpauthbackendrole.GcpAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -571,7 +571,7 @@ gcpauthbackendrole.GcpAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackendrole" gcpauthbackendrole.GcpAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -585,7 +585,7 @@ gcpauthbackendrole.GcpAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackendrole" gcpauthbackendrole.GcpAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -614,7 +614,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1320,7 +1320,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackendrole" &gcpauthbackendrole.GcpAuthBackendRoleConfig { Connection: interface{}, @@ -1367,19 +1367,19 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpauthbackendrole" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Role | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| Type | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| AddGroupAliases | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| AllowGceInference | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| BoundInstanceGroups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| BoundLabels | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| BoundProjects | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| BoundRegions | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| BoundServiceAccounts | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| BoundZones | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| MaxJwtExp | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| Role | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| Type | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| AddGroupAliases | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| AllowGceInference | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| BoundInstanceGroups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| BoundLabels | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| BoundProjects | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| BoundRegions | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| BoundServiceAccounts | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| BoundZones | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| MaxJwtExp | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1471,7 +1471,7 @@ Role *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1483,7 +1483,7 @@ Type *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1495,7 +1495,7 @@ AddGroupAliases interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1507,7 +1507,7 @@ AllowGceInference interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1519,7 +1519,7 @@ Backend *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1531,7 +1531,7 @@ BoundInstanceGroups *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1543,7 +1543,7 @@ BoundLabels *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1555,7 +1555,7 @@ BoundProjects *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1567,7 +1567,7 @@ BoundRegions *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1579,7 +1579,7 @@ BoundServiceAccounts *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1591,7 +1591,7 @@ BoundZones *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1603,7 +1603,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1618,7 +1618,7 @@ MaxJwtExp *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1632,7 +1632,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1646,7 +1646,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -1660,7 +1660,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1674,7 +1674,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -1688,7 +1688,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -1702,7 +1702,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -1716,7 +1716,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -1730,7 +1730,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -1744,7 +1744,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -1758,7 +1758,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpAuthBackendRole.java.md b/docs/gcpAuthBackendRole.java.md index 45426e42..610d6b03 100644 --- a/docs/gcpAuthBackendRole.java.md +++ b/docs/gcpAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -63,19 +63,19 @@ GcpAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| role | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| addGroupAliases | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allowGceInference | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| boundInstanceGroups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| boundLabels | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| boundProjects | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| boundRegions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| boundServiceAccounts | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| boundZones | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| maxJwtExp | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| addGroupAliases | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allowGceInference | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| boundInstanceGroups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| boundLabels | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| boundProjects | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| boundRegions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| boundServiceAccounts | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| boundZones | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| maxJwtExp | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -153,7 +153,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -252,7 +252,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -302,7 +302,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -312,7 +312,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -322,7 +322,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -332,7 +332,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -342,7 +342,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -352,7 +352,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- @@ -926,7 +926,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1686,19 +1686,19 @@ GcpAuthBackendRoleConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| role | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| addGroupAliases | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allowGceInference | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| boundInstanceGroups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| boundLabels | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| boundProjects | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| boundRegions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| boundServiceAccounts | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| boundZones | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| maxJwtExp | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| addGroupAliases | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allowGceInference | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| boundInstanceGroups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| boundLabels | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| boundProjects | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| boundRegions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| boundServiceAccounts | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| boundZones | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| maxJwtExp | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1790,7 +1790,7 @@ public java.lang.String getRole(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1802,7 +1802,7 @@ public java.lang.String getType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1814,7 +1814,7 @@ public java.lang.Object getAddGroupAliases(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1826,7 +1826,7 @@ public java.lang.Object getAllowGceInference(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1838,7 +1838,7 @@ public java.lang.String getBackend(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1850,7 +1850,7 @@ public java.util.List getBoundInstanceGroups(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1862,7 +1862,7 @@ public java.util.List getBoundLabels(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1874,7 +1874,7 @@ public java.util.List getBoundProjects(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1886,7 +1886,7 @@ public java.util.List getBoundRegions(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1898,7 +1898,7 @@ public java.util.List getBoundServiceAccounts(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1910,7 +1910,7 @@ public java.util.List getBoundZones(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1922,7 +1922,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1937,7 +1937,7 @@ public java.lang.String getMaxJwtExp(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1951,7 +1951,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1965,7 +1965,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -1979,7 +1979,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1993,7 +1993,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -2007,7 +2007,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -2021,7 +2021,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -2035,7 +2035,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -2049,7 +2049,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -2063,7 +2063,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -2077,7 +2077,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpAuthBackendRole.python.md b/docs/gcpAuthBackendRole.python.md index 1da31d2d..f10f2439 100644 --- a/docs/gcpAuthBackendRole.python.md +++ b/docs/gcpAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -58,19 +58,19 @@ gcpAuthBackendRole.GcpAuthBackendRole( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| role | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| add_group_aliases | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allow_gce_inference | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| bound_instance_groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| bound_labels | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| bound_projects | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| bound_regions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| bound_service_accounts | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| bound_zones | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| max_jwt_exp | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| add_group_aliases | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allow_gce_inference | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| bound_instance_groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| bound_labels | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| bound_projects | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| bound_regions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| bound_service_accounts | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| bound_zones | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| max_jwt_exp | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -148,7 +148,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -247,7 +247,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -307,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -317,7 +317,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -327,7 +327,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -337,7 +337,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -347,7 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- @@ -967,7 +967,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1720,19 +1720,19 @@ gcpAuthBackendRole.GcpAuthBackendRoleConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| role | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| add_group_aliases | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allow_gce_inference | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| bound_instance_groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| bound_labels | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| bound_projects | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| bound_regions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| bound_service_accounts | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| bound_zones | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| max_jwt_exp | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| add_group_aliases | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allow_gce_inference | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| bound_instance_groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| bound_labels | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| bound_projects | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| bound_regions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| bound_service_accounts | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| bound_zones | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| max_jwt_exp | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1824,7 +1824,7 @@ role: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1836,7 +1836,7 @@ type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1848,7 +1848,7 @@ add_group_aliases: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1860,7 +1860,7 @@ allow_gce_inference: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1872,7 +1872,7 @@ backend: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1884,7 +1884,7 @@ bound_instance_groups: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1896,7 +1896,7 @@ bound_labels: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1908,7 +1908,7 @@ bound_projects: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1920,7 +1920,7 @@ bound_regions: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1932,7 +1932,7 @@ bound_service_accounts: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1944,7 +1944,7 @@ bound_zones: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1956,7 +1956,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1971,7 +1971,7 @@ max_jwt_exp: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1985,7 +1985,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1999,7 +1999,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -2013,7 +2013,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -2027,7 +2027,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -2041,7 +2041,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -2055,7 +2055,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -2069,7 +2069,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -2083,7 +2083,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -2097,7 +2097,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -2111,7 +2111,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpAuthBackendRole.typescript.md b/docs/gcpAuthBackendRole.typescript.md index 13310bf8..9eab202b 100644 --- a/docs/gcpAuthBackendRole.typescript.md +++ b/docs/gcpAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -614,7 +614,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1336,19 +1336,19 @@ const gcpAuthBackendRoleConfig: gcpAuthBackendRole.GcpAuthBackendRoleConfig = { | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| role | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| addGroupAliases | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allowGceInference | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| boundInstanceGroups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| boundLabels | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| boundProjects | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| boundRegions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| boundServiceAccounts | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| boundZones | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| maxJwtExp | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| addGroupAliases | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allowGceInference | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| boundInstanceGroups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| boundLabels | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| boundProjects | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| boundRegions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| boundServiceAccounts | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| boundZones | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| maxJwtExp | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1440,7 +1440,7 @@ public readonly role: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1452,7 +1452,7 @@ public readonly type: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1464,7 +1464,7 @@ public readonly addGroupAliases: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1476,7 +1476,7 @@ public readonly allowGceInference: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1488,7 +1488,7 @@ public readonly backend: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1500,7 +1500,7 @@ public readonly boundInstanceGroups: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1512,7 +1512,7 @@ public readonly boundLabels: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1524,7 +1524,7 @@ public readonly boundProjects: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1536,7 +1536,7 @@ public readonly boundRegions: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1548,7 +1548,7 @@ public readonly boundServiceAccounts: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1560,7 +1560,7 @@ public readonly boundZones: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1572,7 +1572,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1587,7 +1587,7 @@ public readonly maxJwtExp: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1601,7 +1601,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1615,7 +1615,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -1629,7 +1629,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1643,7 +1643,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -1657,7 +1657,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -1671,7 +1671,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -1685,7 +1685,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -1699,7 +1699,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -1713,7 +1713,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -1727,7 +1727,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpSecretBackend.csharp.md b/docs/gcpSecretBackend.csharp.md index c4736368..b9bf810b 100644 --- a/docs/gcpSecretBackend.csharp.md +++ b/docs/gcpSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -965,7 +965,7 @@ new GcpSecretBackendConfig { | DefaultLeaseTtlSeconds | double | Default lease duration for secrets in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | Local | object | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for secrets in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1053,7 +1053,7 @@ public string Credentials { get; set; } JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1067,7 +1067,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1081,7 +1081,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1095,7 +1095,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1107,7 +1107,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1124,7 +1124,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1138,7 +1138,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1152,7 +1152,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1166,7 +1166,7 @@ public string Path { get; set; } Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- diff --git a/docs/gcpSecretBackend.go.md b/docs/gcpSecretBackend.go.md index 160d374d..96c69443 100644 --- a/docs/gcpSecretBackend.go.md +++ b/docs/gcpSecretBackend.go.md @@ -4,12 +4,12 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretbackend" gcpsecretbackend.NewGcpSecretBackend(scope Construct, id *string, config GcpSecretBackendConfig) GcpSecretBackend ``` @@ -441,7 +441,7 @@ func ResetPath() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretbackend" gcpsecretbackend.GcpSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -473,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretbackend" gcpsecretbackend.GcpSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +487,7 @@ gcpsecretbackend.GcpSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretbackend" gcpsecretbackend.GcpSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +501,7 @@ gcpsecretbackend.GcpSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretbackend" gcpsecretbackend.GcpSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -530,7 +530,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -928,7 +928,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretbackend" &gcpsecretbackend.GcpSecretBackendConfig { Connection: interface{}, @@ -965,7 +965,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretbackend" | DefaultLeaseTtlSeconds | *f64 | Default lease duration for secrets in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | Local | interface{} | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for secrets in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1053,7 +1053,7 @@ Credentials *string JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1067,7 +1067,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1081,7 +1081,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1095,7 +1095,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1107,7 +1107,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1124,7 +1124,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1138,7 +1138,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1152,7 +1152,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1166,7 +1166,7 @@ Path *string Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- diff --git a/docs/gcpSecretBackend.java.md b/docs/gcpSecretBackend.java.md index cc8cca34..45d7a1b2 100644 --- a/docs/gcpSecretBackend.java.md +++ b/docs/gcpSecretBackend.java.md @@ -4,7 +4,7 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers @@ -52,7 +52,7 @@ GcpSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- @@ -697,7 +697,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1138,7 +1138,7 @@ GcpSecretBackendConfig.builder() | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1226,7 +1226,7 @@ public java.lang.String getCredentials(); JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1240,7 +1240,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1254,7 +1254,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1268,7 +1268,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1280,7 +1280,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1297,7 +1297,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1311,7 +1311,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1325,7 +1325,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1339,7 +1339,7 @@ public java.lang.String getPath(); Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- diff --git a/docs/gcpSecretBackend.python.md b/docs/gcpSecretBackend.python.md index 1f7fff95..09e7efc8 100644 --- a/docs/gcpSecretBackend.python.md +++ b/docs/gcpSecretBackend.python.md @@ -4,7 +4,7 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers @@ -48,7 +48,7 @@ gcpSecretBackend.GcpSecretBackend( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- @@ -739,7 +739,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1174,7 +1174,7 @@ gcpSecretBackend.GcpSecretBackendConfig( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1262,7 +1262,7 @@ credentials: str JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1276,7 +1276,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1290,7 +1290,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1304,7 +1304,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1316,7 +1316,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1333,7 +1333,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1347,7 +1347,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1361,7 +1361,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1375,7 +1375,7 @@ path: str Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- diff --git a/docs/gcpSecretBackend.typescript.md b/docs/gcpSecretBackend.typescript.md index a9cf1b4b..a601f288 100644 --- a/docs/gcpSecretBackend.typescript.md +++ b/docs/gcpSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -948,7 +948,7 @@ const gcpSecretBackendConfig: gcpSecretBackend.GcpSecretBackendConfig = { ... } | defaultLeaseTtlSeconds | number | Default lease duration for secrets in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | local | boolean \| cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for secrets in seconds. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1036,7 +1036,7 @@ public readonly credentials: string; JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1050,7 +1050,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1064,7 +1064,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1078,7 +1078,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1090,7 +1090,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1107,7 +1107,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1121,7 +1121,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1135,7 +1135,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1149,7 +1149,7 @@ public readonly path: string; Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- diff --git a/docs/gcpSecretImpersonatedAccount.csharp.md b/docs/gcpSecretImpersonatedAccount.csharp.md index 251d53c4..96d0e45b 100644 --- a/docs/gcpSecretImpersonatedAccount.csharp.md +++ b/docs/gcpSecretImpersonatedAccount.csharp.md @@ -4,7 +4,7 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -864,7 +864,7 @@ new GcpSecretImpersonatedAccountConfig { | Backend | string | Path where the GCP secrets engine is mounted. | | ImpersonatedAccount | string | Name of the Impersonated Account to create. | | ServiceAccountEmail | string | Email of the GCP service account. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | @@ -950,7 +950,7 @@ public string Backend { get; set; } Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -964,7 +964,7 @@ public string ImpersonatedAccount { get; set; } Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -978,7 +978,7 @@ public string ServiceAccountEmail { get; set; } Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -990,7 +990,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1007,7 +1007,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1021,7 +1021,7 @@ public string[] TokenScopes { get; set; } List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} --- diff --git a/docs/gcpSecretImpersonatedAccount.go.md b/docs/gcpSecretImpersonatedAccount.go.md index aec03235..b42a8f05 100644 --- a/docs/gcpSecretImpersonatedAccount.go.md +++ b/docs/gcpSecretImpersonatedAccount.go.md @@ -4,12 +4,12 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.NewGcpSecretImpersonatedAccount(scope Construct, id *string, config GcpSecretImpersonatedAccountConfig) GcpSecretImpersonatedAccount ``` @@ -399,7 +399,7 @@ func ResetTokenScopes() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformElement(x i ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_IsTerraformResource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonatedaccount" gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -831,7 +831,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonatedaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonatedaccount" &gcpsecretimpersonatedaccount.GcpSecretImpersonatedAccountConfig { Connection: interface{}, @@ -864,7 +864,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretimpersonated | Backend | *string | Path where the GCP secrets engine is mounted. | | ImpersonatedAccount | *string | Name of the Impersonated Account to create. | | ServiceAccountEmail | *string | Email of the GCP service account. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenScopes | *[]*string | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | @@ -950,7 +950,7 @@ Backend *string Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -964,7 +964,7 @@ ImpersonatedAccount *string Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -978,7 +978,7 @@ ServiceAccountEmail *string Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -990,7 +990,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1007,7 +1007,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1021,7 +1021,7 @@ TokenScopes *[]*string List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} --- diff --git a/docs/gcpSecretImpersonatedAccount.java.md b/docs/gcpSecretImpersonatedAccount.java.md index 127d7f5b..b1f391cf 100644 --- a/docs/gcpSecretImpersonatedAccount.java.md +++ b/docs/gcpSecretImpersonatedAccount.java.md @@ -4,7 +4,7 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers @@ -46,7 +46,7 @@ GcpSecretImpersonatedAccount.Builder.create(Construct scope, java.lang.String id | backend | java.lang.String | Path where the GCP secrets engine is mounted. | | impersonatedAccount | java.lang.String | Name of the Impersonated Account to create. | | serviceAccountEmail | java.lang.String | Email of the GCP service account. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} --- @@ -617,7 +617,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ GcpSecretImpersonatedAccountConfig.builder() | backend | java.lang.String | Path where the GCP secrets engine is mounted. | | impersonatedAccount | java.lang.String | Name of the Impersonated Account to create. | | serviceAccountEmail | java.lang.String | Email of the GCP service account. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | @@ -1083,7 +1083,7 @@ public java.lang.String getBackend(); Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -1097,7 +1097,7 @@ public java.lang.String getImpersonatedAccount(); Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -1111,7 +1111,7 @@ public java.lang.String getServiceAccountEmail(); Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -1123,7 +1123,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1140,7 +1140,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1154,7 +1154,7 @@ public java.util.List getTokenScopes(); List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} --- diff --git a/docs/gcpSecretImpersonatedAccount.python.md b/docs/gcpSecretImpersonatedAccount.python.md index b4bf5631..9bd9e08c 100644 --- a/docs/gcpSecretImpersonatedAccount.python.md +++ b/docs/gcpSecretImpersonatedAccount.python.md @@ -4,7 +4,7 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers @@ -44,7 +44,7 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount( | backend | str | Path where the GCP secrets engine is mounted. | | impersonated_account | str | Name of the Impersonated Account to create. | | service_account_email | str | Email of the GCP service account. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -1037,7 +1037,7 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccountConfig( | backend | str | Path where the GCP secrets engine is mounted. | | impersonated_account | str | Name of the Impersonated Account to create. | | service_account_email | str | Email of the GCP service account. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | @@ -1123,7 +1123,7 @@ backend: str Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -1137,7 +1137,7 @@ impersonated_account: str Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -1151,7 +1151,7 @@ service_account_email: str Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -1163,7 +1163,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1180,7 +1180,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1194,7 +1194,7 @@ token_scopes: typing.List[str] List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} --- diff --git a/docs/gcpSecretImpersonatedAccount.typescript.md b/docs/gcpSecretImpersonatedAccount.typescript.md index 638732fe..d7d5fd3e 100644 --- a/docs/gcpSecretImpersonatedAccount.typescript.md +++ b/docs/gcpSecretImpersonatedAccount.typescript.md @@ -4,7 +4,7 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -850,7 +850,7 @@ const gcpSecretImpersonatedAccountConfig: gcpSecretImpersonatedAccount.GcpSecret | backend | string | Path where the GCP secrets engine is mounted. | | impersonatedAccount | string | Name of the Impersonated Account to create. | | serviceAccountEmail | string | Email of the GCP service account. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | @@ -936,7 +936,7 @@ public readonly backend: string; Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -950,7 +950,7 @@ public readonly impersonatedAccount: string; Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -964,7 +964,7 @@ public readonly serviceAccountEmail: string; Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -976,7 +976,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -993,7 +993,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1007,7 +1007,7 @@ public readonly tokenScopes: string[]; List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} --- diff --git a/docs/gcpSecretRoleset.csharp.md b/docs/gcpSecretRoleset.csharp.md index f420057f..3595baee 100644 --- a/docs/gcpSecretRoleset.csharp.md +++ b/docs/gcpSecretRoleset.csharp.md @@ -4,7 +4,7 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers @@ -508,7 +508,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -922,7 +922,7 @@ public string Resource { get; set; } Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -936,7 +936,7 @@ public string[] Roles { get; set; } List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -981,7 +981,7 @@ new GcpSecretRolesetConfig { | Binding | object | binding block. | | Project | string | Name of the GCP project that this roleset's service account will belong to. | | Roleset | string | Name of the RoleSet to create. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretType | string | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | TokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1068,7 +1068,7 @@ public string Backend { get; set; } Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1082,7 +1082,7 @@ public object Binding { get; set; } binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1096,7 +1096,7 @@ public string Project { get; set; } Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1110,7 +1110,7 @@ public string Roleset { get; set; } Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1122,7 +1122,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1139,7 +1139,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1153,7 +1153,7 @@ public string SecretType { get; set; } Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1167,7 +1167,7 @@ public string[] TokenScopes { get; set; } List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- diff --git a/docs/gcpSecretRoleset.go.md b/docs/gcpSecretRoleset.go.md index 04fcd78e..5b09bc46 100644 --- a/docs/gcpSecretRoleset.go.md +++ b/docs/gcpSecretRoleset.go.md @@ -4,12 +4,12 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" gcpsecretroleset.NewGcpSecretRoleset(scope Construct, id *string, config GcpSecretRolesetConfig) GcpSecretRoleset ``` @@ -419,7 +419,7 @@ func ResetTokenScopes() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" gcpsecretroleset.GcpSecretRoleset_IsConstruct(x interface{}) *bool ``` @@ -451,7 +451,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" gcpsecretroleset.GcpSecretRoleset_IsTerraformElement(x interface{}) *bool ``` @@ -465,7 +465,7 @@ gcpsecretroleset.GcpSecretRoleset_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" gcpsecretroleset.GcpSecretRoleset_IsTerraformResource(x interface{}) *bool ``` @@ -479,7 +479,7 @@ gcpsecretroleset.GcpSecretRoleset_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" gcpsecretroleset.GcpSecretRoleset_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -508,7 +508,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -895,7 +895,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" &gcpsecretroleset.GcpSecretRolesetBinding { Resource: *string, @@ -922,7 +922,7 @@ Resource *string Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -936,7 +936,7 @@ Roles *[]*string List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -945,7 +945,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" &gcpsecretroleset.GcpSecretRolesetConfig { Connection: interface{}, @@ -981,7 +981,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" | Binding | interface{} | binding block. | | Project | *string | Name of the GCP project that this roleset's service account will belong to. | | Roleset | *string | Name of the RoleSet to create. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretType | *string | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | TokenScopes | *[]*string | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1068,7 +1068,7 @@ Backend *string Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1082,7 +1082,7 @@ Binding interface{} binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1096,7 +1096,7 @@ Project *string Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1110,7 +1110,7 @@ Roleset *string Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1122,7 +1122,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1139,7 +1139,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1153,7 +1153,7 @@ SecretType *string Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1167,7 +1167,7 @@ TokenScopes *[]*string List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- @@ -1178,7 +1178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" gcpsecretroleset.NewGcpSecretRolesetBindingList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) GcpSecretRolesetBindingList ``` @@ -1338,7 +1338,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretroleset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" gcpsecretroleset.NewGcpSecretRolesetBindingOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) GcpSecretRolesetBindingOutputReference ``` diff --git a/docs/gcpSecretRoleset.java.md b/docs/gcpSecretRoleset.java.md index 65a9c1e9..75d06bf1 100644 --- a/docs/gcpSecretRoleset.java.md +++ b/docs/gcpSecretRoleset.java.md @@ -4,7 +4,7 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers @@ -50,7 +50,7 @@ GcpSecretRoleset.Builder.create(Construct scope, java.lang.String id) | binding | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretRolesetBinding> | binding block. | | project | java.lang.String | Name of the GCP project that this roleset's service account will belong to. | | roleset | java.lang.String | Name of the RoleSet to create. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretType | java.lang.String | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -174,7 +174,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- @@ -662,7 +662,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -1076,7 +1076,7 @@ public java.lang.String getResource(); Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -1090,7 +1090,7 @@ public java.util.List getRoles(); List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -1140,7 +1140,7 @@ GcpSecretRolesetConfig.builder() | binding | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretRolesetBinding> | binding block. | | project | java.lang.String | Name of the GCP project that this roleset's service account will belong to. | | roleset | java.lang.String | Name of the RoleSet to create. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretType | java.lang.String | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1227,7 +1227,7 @@ public java.lang.String getBackend(); Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1241,7 +1241,7 @@ public java.lang.Object getBinding(); binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1255,7 +1255,7 @@ public java.lang.String getProject(); Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1269,7 +1269,7 @@ public java.lang.String getRoleset(); Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1281,7 +1281,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1298,7 +1298,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1312,7 +1312,7 @@ public java.lang.String getSecretType(); Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1326,7 +1326,7 @@ public java.util.List getTokenScopes(); List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- diff --git a/docs/gcpSecretRoleset.python.md b/docs/gcpSecretRoleset.python.md index c85d64eb..b04833a7 100644 --- a/docs/gcpSecretRoleset.python.md +++ b/docs/gcpSecretRoleset.python.md @@ -4,7 +4,7 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers @@ -47,7 +47,7 @@ gcpSecretRoleset.GcpSecretRoleset( | binding | typing.Union[cdktf.IResolvable, typing.List[GcpSecretRolesetBinding]] | binding block. | | project | str | Name of the GCP project that this roleset's service account will belong to. | | roleset | str | Name of the RoleSet to create. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_type | str | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- @@ -707,7 +707,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -1121,7 +1121,7 @@ resource: str Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -1135,7 +1135,7 @@ roles: typing.List[str] List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -1180,7 +1180,7 @@ gcpSecretRoleset.GcpSecretRolesetConfig( | binding | typing.Union[cdktf.IResolvable, typing.List[GcpSecretRolesetBinding]] | binding block. | | project | str | Name of the GCP project that this roleset's service account will belong to. | | roleset | str | Name of the RoleSet to create. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_type | str | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1267,7 +1267,7 @@ backend: str Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1281,7 +1281,7 @@ binding: typing.Union[IResolvable, typing.List[GcpSecretRolesetBinding]] binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1295,7 +1295,7 @@ project: str Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1309,7 +1309,7 @@ roleset: str Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1321,7 +1321,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1338,7 +1338,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1352,7 +1352,7 @@ secret_type: str Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1366,7 +1366,7 @@ token_scopes: typing.List[str] List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- diff --git a/docs/gcpSecretRoleset.typescript.md b/docs/gcpSecretRoleset.typescript.md index ace0ffcb..4ed00eae 100644 --- a/docs/gcpSecretRoleset.typescript.md +++ b/docs/gcpSecretRoleset.typescript.md @@ -4,7 +4,7 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers @@ -508,7 +508,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -919,7 +919,7 @@ public readonly resource: string; Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -933,7 +933,7 @@ public readonly roles: string[]; List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -962,7 +962,7 @@ const gcpSecretRolesetConfig: gcpSecretRoleset.GcpSecretRolesetConfig = { ... } | binding | cdktf.IResolvable \| GcpSecretRolesetBinding[] | binding block. | | project | string | Name of the GCP project that this roleset's service account will belong to. | | roleset | string | Name of the RoleSet to create. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | string | Target namespace. (requires Enterprise). | | secretType | string | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1049,7 +1049,7 @@ public readonly backend: string; Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1063,7 +1063,7 @@ public readonly binding: IResolvable | GcpSecretRolesetBinding[]; binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1077,7 +1077,7 @@ public readonly project: string; Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1091,7 +1091,7 @@ public readonly roleset: string; Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1103,7 +1103,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1120,7 +1120,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1134,7 +1134,7 @@ public readonly secretType: string; Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1148,7 +1148,7 @@ public readonly tokenScopes: string[]; List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- diff --git a/docs/gcpSecretStaticAccount.csharp.md b/docs/gcpSecretStaticAccount.csharp.md index 40b12acf..b33722cf 100644 --- a/docs/gcpSecretStaticAccount.csharp.md +++ b/docs/gcpSecretStaticAccount.csharp.md @@ -4,7 +4,7 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers @@ -515,7 +515,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -929,7 +929,7 @@ public string Resource { get; set; } Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -943,7 +943,7 @@ public string[] Roles { get; set; } List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -988,7 +988,7 @@ new GcpSecretStaticAccountConfig { | ServiceAccountEmail | string | Email of the GCP service account. | | StaticAccount | string | Name of the Static Account to create. | | Binding | object | binding block. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretType | string | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | TokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1075,7 +1075,7 @@ public string Backend { get; set; } Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1089,7 +1089,7 @@ public string ServiceAccountEmail { get; set; } Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1103,7 +1103,7 @@ public string StaticAccount { get; set; } Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1117,7 +1117,7 @@ public object Binding { get; set; } binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1129,7 +1129,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1146,7 +1146,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1160,7 +1160,7 @@ public string SecretType { get; set; } Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1174,7 +1174,7 @@ public string[] TokenScopes { get; set; } List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- diff --git a/docs/gcpSecretStaticAccount.go.md b/docs/gcpSecretStaticAccount.go.md index 14657980..dd8b572b 100644 --- a/docs/gcpSecretStaticAccount.go.md +++ b/docs/gcpSecretStaticAccount.go.md @@ -4,12 +4,12 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccount" gcpsecretstaticaccount.NewGcpSecretStaticAccount(scope Construct, id *string, config GcpSecretStaticAccountConfig) GcpSecretStaticAccount ``` @@ -426,7 +426,7 @@ func ResetTokenScopes() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccount" gcpsecretstaticaccount.GcpSecretStaticAccount_IsConstruct(x interface{}) *bool ``` @@ -458,7 +458,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccount" gcpsecretstaticaccount.GcpSecretStaticAccount_IsTerraformElement(x interface{}) *bool ``` @@ -472,7 +472,7 @@ gcpsecretstaticaccount.GcpSecretStaticAccount_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccount" gcpsecretstaticaccount.GcpSecretStaticAccount_IsTerraformResource(x interface{}) *bool ``` @@ -486,7 +486,7 @@ gcpsecretstaticaccount.GcpSecretStaticAccount_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccount" gcpsecretstaticaccount.GcpSecretStaticAccount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -515,7 +515,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -902,7 +902,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccount" &gcpsecretstaticaccount.GcpSecretStaticAccountBinding { Resource: *string, @@ -929,7 +929,7 @@ Resource *string Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -943,7 +943,7 @@ Roles *[]*string List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -952,7 +952,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccount" &gcpsecretstaticaccount.GcpSecretStaticAccountConfig { Connection: interface{}, @@ -988,7 +988,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccoun | ServiceAccountEmail | *string | Email of the GCP service account. | | StaticAccount | *string | Name of the Static Account to create. | | Binding | interface{} | binding block. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretType | *string | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | TokenScopes | *[]*string | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1075,7 +1075,7 @@ Backend *string Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1089,7 +1089,7 @@ ServiceAccountEmail *string Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1103,7 +1103,7 @@ StaticAccount *string Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1117,7 +1117,7 @@ Binding interface{} binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1129,7 +1129,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1146,7 +1146,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1160,7 +1160,7 @@ SecretType *string Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1174,7 +1174,7 @@ TokenScopes *[]*string List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- @@ -1185,7 +1185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccount" gcpsecretstaticaccount.NewGcpSecretStaticAccountBindingList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) GcpSecretStaticAccountBindingList ``` @@ -1345,7 +1345,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/gcpsecretstaticaccount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccount" gcpsecretstaticaccount.NewGcpSecretStaticAccountBindingOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) GcpSecretStaticAccountBindingOutputReference ``` diff --git a/docs/gcpSecretStaticAccount.java.md b/docs/gcpSecretStaticAccount.java.md index 2cc0d8ea..34f460bf 100644 --- a/docs/gcpSecretStaticAccount.java.md +++ b/docs/gcpSecretStaticAccount.java.md @@ -4,7 +4,7 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers @@ -50,7 +50,7 @@ GcpSecretStaticAccount.Builder.create(Construct scope, java.lang.String id) | serviceAccountEmail | java.lang.String | Email of the GCP service account. | | staticAccount | java.lang.String | Name of the Static Account to create. | | binding | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretStaticAccountBinding> | binding block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretType | java.lang.String | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -174,7 +174,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- @@ -669,7 +669,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -1083,7 +1083,7 @@ public java.lang.String getResource(); Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -1097,7 +1097,7 @@ public java.util.List getRoles(); List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -1147,7 +1147,7 @@ GcpSecretStaticAccountConfig.builder() | serviceAccountEmail | java.lang.String | Email of the GCP service account. | | staticAccount | java.lang.String | Name of the Static Account to create. | | binding | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretStaticAccountBinding> | binding block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretType | java.lang.String | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1234,7 +1234,7 @@ public java.lang.String getBackend(); Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1248,7 +1248,7 @@ public java.lang.String getServiceAccountEmail(); Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1262,7 +1262,7 @@ public java.lang.String getStaticAccount(); Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1276,7 +1276,7 @@ public java.lang.Object getBinding(); binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1288,7 +1288,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1305,7 +1305,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1319,7 +1319,7 @@ public java.lang.String getSecretType(); Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1333,7 +1333,7 @@ public java.util.List getTokenScopes(); List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- diff --git a/docs/gcpSecretStaticAccount.python.md b/docs/gcpSecretStaticAccount.python.md index 4ce4c5e5..1294df3a 100644 --- a/docs/gcpSecretStaticAccount.python.md +++ b/docs/gcpSecretStaticAccount.python.md @@ -4,7 +4,7 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers @@ -47,7 +47,7 @@ gcpSecretStaticAccount.GcpSecretStaticAccount( | service_account_email | str | Email of the GCP service account. | | static_account | str | Name of the Static Account to create. | | binding | typing.Union[cdktf.IResolvable, typing.List[GcpSecretStaticAccountBinding]] | binding block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_type | str | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- @@ -714,7 +714,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -1128,7 +1128,7 @@ resource: str Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -1142,7 +1142,7 @@ roles: typing.List[str] List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -1187,7 +1187,7 @@ gcpSecretStaticAccount.GcpSecretStaticAccountConfig( | service_account_email | str | Email of the GCP service account. | | static_account | str | Name of the Static Account to create. | | binding | typing.Union[cdktf.IResolvable, typing.List[GcpSecretStaticAccountBinding]] | binding block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_type | str | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1274,7 +1274,7 @@ backend: str Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1288,7 +1288,7 @@ service_account_email: str Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1302,7 +1302,7 @@ static_account: str Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1316,7 +1316,7 @@ binding: typing.Union[IResolvable, typing.List[GcpSecretStaticAccountBinding]] binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1328,7 +1328,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1345,7 +1345,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1359,7 +1359,7 @@ secret_type: str Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1373,7 +1373,7 @@ token_scopes: typing.List[str] List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- diff --git a/docs/gcpSecretStaticAccount.typescript.md b/docs/gcpSecretStaticAccount.typescript.md index 2e15dd6d..f3d9ca50 100644 --- a/docs/gcpSecretStaticAccount.typescript.md +++ b/docs/gcpSecretStaticAccount.typescript.md @@ -4,7 +4,7 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers @@ -515,7 +515,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -926,7 +926,7 @@ public readonly resource: string; Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -940,7 +940,7 @@ public readonly roles: string[]; List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -969,7 +969,7 @@ const gcpSecretStaticAccountConfig: gcpSecretStaticAccount.GcpSecretStaticAccoun | serviceAccountEmail | string | Email of the GCP service account. | | staticAccount | string | Name of the Static Account to create. | | binding | cdktf.IResolvable \| GcpSecretStaticAccountBinding[] | binding block. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | string | Target namespace. (requires Enterprise). | | secretType | string | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1056,7 +1056,7 @@ public readonly backend: string; Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1070,7 +1070,7 @@ public readonly serviceAccountEmail: string; Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1084,7 +1084,7 @@ public readonly staticAccount: string; Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1098,7 +1098,7 @@ public readonly binding: IResolvable | GcpSecretStaticAccountBinding[]; binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1110,7 +1110,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1127,7 +1127,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1141,7 +1141,7 @@ public readonly secretType: string; Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1155,7 +1155,7 @@ public readonly tokenScopes: string[]; List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- diff --git a/docs/genericEndpoint.csharp.md b/docs/genericEndpoint.csharp.md index 942adc58..b9a620d6 100644 --- a/docs/genericEndpoint.csharp.md +++ b/docs/genericEndpoint.csharp.md @@ -4,7 +4,7 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -943,7 +943,7 @@ new GenericEndpointConfig { | Path | string | Full path where to the endpoint that will be written. | | DisableDelete | object | Don't attempt to delete the path from Vault if true. | | DisableRead | object | Don't attempt to read the path from Vault if true; drift won't be detected. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | IgnoreAbsentFields | object | When reading, disregard fields not present in data_json. | | Namespace | string | Target namespace. (requires Enterprise). | | WriteFields | string[] | Top-level fields returned by write to persist in state. | @@ -1030,7 +1030,7 @@ public string DataJson { get; set; } JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1044,7 +1044,7 @@ public string Path { get; set; } Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1058,7 +1058,7 @@ public object DisableDelete { get; set; } Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1072,7 +1072,7 @@ public object DisableRead { get; set; } Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1084,7 +1084,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1101,7 +1101,7 @@ public object IgnoreAbsentFields { get; set; } When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1115,7 +1115,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1129,7 +1129,7 @@ public string[] WriteFields { get; set; } Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericEndpoint.go.md b/docs/genericEndpoint.go.md index 251e4c2e..120bffcc 100644 --- a/docs/genericEndpoint.go.md +++ b/docs/genericEndpoint.go.md @@ -4,12 +4,12 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericendpoint" genericendpoint.NewGenericEndpoint(scope Construct, id *string, config GenericEndpointConfig) GenericEndpoint ``` @@ -420,7 +420,7 @@ func ResetWriteFields() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericendpoint" genericendpoint.GenericEndpoint_IsConstruct(x interface{}) *bool ``` @@ -452,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericendpoint" genericendpoint.GenericEndpoint_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +466,7 @@ genericendpoint.GenericEndpoint_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericendpoint" genericendpoint.GenericEndpoint_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +480,7 @@ genericendpoint.GenericEndpoint_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericendpoint" genericendpoint.GenericEndpoint_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +509,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -907,7 +907,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericendpoint" &genericendpoint.GenericEndpointConfig { Connection: interface{}, @@ -943,7 +943,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericendpoint" | Path | *string | Full path where to the endpoint that will be written. | | DisableDelete | interface{} | Don't attempt to delete the path from Vault if true. | | DisableRead | interface{} | Don't attempt to read the path from Vault if true; drift won't be detected. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | IgnoreAbsentFields | interface{} | When reading, disregard fields not present in data_json. | | Namespace | *string | Target namespace. (requires Enterprise). | | WriteFields | *[]*string | Top-level fields returned by write to persist in state. | @@ -1030,7 +1030,7 @@ DataJson *string JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1044,7 +1044,7 @@ Path *string Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1058,7 +1058,7 @@ DisableDelete interface{} Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1072,7 +1072,7 @@ DisableRead interface{} Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1084,7 +1084,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1101,7 +1101,7 @@ IgnoreAbsentFields interface{} When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1115,7 +1115,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1129,7 +1129,7 @@ WriteFields *[]*string Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericEndpoint.java.md b/docs/genericEndpoint.java.md index 3928acb2..dc62d45c 100644 --- a/docs/genericEndpoint.java.md +++ b/docs/genericEndpoint.java.md @@ -4,7 +4,7 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers @@ -52,7 +52,7 @@ GenericEndpoint.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Full path where to the endpoint that will be written. | | disableDelete | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to delete the path from Vault if true. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignoreAbsentFields | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When reading, disregard fields not present in data_json. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | writeFields | java.util.List | Top-level fields returned by write to persist in state. | @@ -125,7 +125,7 @@ Must be unique amongst siblings in the same scope JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- @@ -665,7 +665,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -1106,7 +1106,7 @@ GenericEndpointConfig.builder() | path | java.lang.String | Full path where to the endpoint that will be written. | | disableDelete | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to delete the path from Vault if true. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignoreAbsentFields | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When reading, disregard fields not present in data_json. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | writeFields | java.util.List | Top-level fields returned by write to persist in state. | @@ -1193,7 +1193,7 @@ public java.lang.String getDataJson(); JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1207,7 +1207,7 @@ public java.lang.String getPath(); Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1221,7 +1221,7 @@ public java.lang.Object getDisableDelete(); Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1235,7 +1235,7 @@ public java.lang.Object getDisableRead(); Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1247,7 +1247,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1264,7 +1264,7 @@ public java.lang.Object getIgnoreAbsentFields(); When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1278,7 +1278,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1292,7 +1292,7 @@ public java.util.List getWriteFields(); Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericEndpoint.python.md b/docs/genericEndpoint.python.md index a70d299e..49d0dd87 100644 --- a/docs/genericEndpoint.python.md +++ b/docs/genericEndpoint.python.md @@ -4,7 +4,7 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers @@ -47,7 +47,7 @@ genericEndpoint.GenericEndpoint( | path | str | Full path where to the endpoint that will be written. | | disable_delete | typing.Union[bool, cdktf.IResolvable] | Don't attempt to delete the path from Vault if true. | | disable_read | typing.Union[bool, cdktf.IResolvable] | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignore_absent_fields | typing.Union[bool, cdktf.IResolvable] | When reading, disregard fields not present in data_json. | | namespace | str | Target namespace. (requires Enterprise). | | write_fields | typing.List[str] | Top-level fields returned by write to persist in state. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- @@ -706,7 +706,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -1140,7 +1140,7 @@ genericEndpoint.GenericEndpointConfig( | path | str | Full path where to the endpoint that will be written. | | disable_delete | typing.Union[bool, cdktf.IResolvable] | Don't attempt to delete the path from Vault if true. | | disable_read | typing.Union[bool, cdktf.IResolvable] | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignore_absent_fields | typing.Union[bool, cdktf.IResolvable] | When reading, disregard fields not present in data_json. | | namespace | str | Target namespace. (requires Enterprise). | | write_fields | typing.List[str] | Top-level fields returned by write to persist in state. | @@ -1227,7 +1227,7 @@ data_json: str JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1241,7 +1241,7 @@ path: str Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1255,7 +1255,7 @@ disable_delete: typing.Union[bool, IResolvable] Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1269,7 +1269,7 @@ disable_read: typing.Union[bool, IResolvable] Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1281,7 +1281,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1298,7 +1298,7 @@ ignore_absent_fields: typing.Union[bool, IResolvable] When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1312,7 +1312,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1326,7 +1326,7 @@ write_fields: typing.List[str] Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericEndpoint.typescript.md b/docs/genericEndpoint.typescript.md index 54c1ad39..747fa99b 100644 --- a/docs/genericEndpoint.typescript.md +++ b/docs/genericEndpoint.typescript.md @@ -4,7 +4,7 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -927,7 +927,7 @@ const genericEndpointConfig: genericEndpoint.GenericEndpointConfig = { ... } | path | string | Full path where to the endpoint that will be written. | | disableDelete | boolean \| cdktf.IResolvable | Don't attempt to delete the path from Vault if true. | | disableRead | boolean \| cdktf.IResolvable | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignoreAbsentFields | boolean \| cdktf.IResolvable | When reading, disregard fields not present in data_json. | | namespace | string | Target namespace. (requires Enterprise). | | writeFields | string[] | Top-level fields returned by write to persist in state. | @@ -1014,7 +1014,7 @@ public readonly dataJson: string; JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1028,7 +1028,7 @@ public readonly path: string; Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1042,7 +1042,7 @@ public readonly disableDelete: boolean | IResolvable; Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1056,7 +1056,7 @@ public readonly disableRead: boolean | IResolvable; Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1068,7 +1068,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1085,7 +1085,7 @@ public readonly ignoreAbsentFields: boolean | IResolvable; When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1099,7 +1099,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1113,7 +1113,7 @@ public readonly writeFields: string[]; Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericSecret.csharp.md b/docs/genericSecret.csharp.md index 2d5ab368..40d8c0da 100644 --- a/docs/genericSecret.csharp.md +++ b/docs/genericSecret.csharp.md @@ -4,7 +4,7 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -872,7 +872,7 @@ new GenericSecretConfig { | Path | string | Full path where the generic secret will be written. | | DeleteAllVersions | object | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | DisableRead | object | Don't attempt to read the token from Vault if true; drift won't be detected. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -957,7 +957,7 @@ public string DataJson { get; set; } JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -971,7 +971,7 @@ public string Path { get; set; } Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -985,7 +985,7 @@ public object DeleteAllVersions { get; set; } Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -999,7 +999,7 @@ public object DisableRead { get; set; } Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -1011,7 +1011,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/genericSecret.go.md b/docs/genericSecret.go.md index a44ef21c..f2b6f544 100644 --- a/docs/genericSecret.go.md +++ b/docs/genericSecret.go.md @@ -4,12 +4,12 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericsecret" genericsecret.NewGenericSecret(scope Construct, id *string, config GenericSecretConfig) GenericSecret ``` @@ -406,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericsecret" genericsecret.GenericSecret_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericsecret" genericsecret.GenericSecret_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ genericsecret.GenericSecret_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericsecret" genericsecret.GenericSecret_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ genericsecret.GenericSecret_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericsecret" genericsecret.GenericSecret_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -838,7 +838,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericsecret" &genericsecret.GenericSecretConfig { Connection: interface{}, @@ -872,7 +872,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/genericsecret" | Path | *string | Full path where the generic secret will be written. | | DeleteAllVersions | interface{} | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | DisableRead | interface{} | Don't attempt to read the token from Vault if true; drift won't be detected. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -957,7 +957,7 @@ DataJson *string JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -971,7 +971,7 @@ Path *string Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -985,7 +985,7 @@ DeleteAllVersions interface{} Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -999,7 +999,7 @@ DisableRead interface{} Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -1011,7 +1011,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/genericSecret.java.md b/docs/genericSecret.java.md index 9e54ea50..d4d53c1b 100644 --- a/docs/genericSecret.java.md +++ b/docs/genericSecret.java.md @@ -4,7 +4,7 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers @@ -49,7 +49,7 @@ GenericSecret.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Full path where the generic secret will be written. | | deleteAllVersions | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- @@ -626,7 +626,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -1009,7 +1009,7 @@ GenericSecretConfig.builder() | path | java.lang.String | Full path where the generic secret will be written. | | deleteAllVersions | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1094,7 +1094,7 @@ public java.lang.String getDataJson(); JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -1108,7 +1108,7 @@ public java.lang.String getPath(); Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -1122,7 +1122,7 @@ public java.lang.Object getDeleteAllVersions(); Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -1136,7 +1136,7 @@ public java.lang.Object getDisableRead(); Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -1148,7 +1148,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1165,7 +1165,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/genericSecret.python.md b/docs/genericSecret.python.md index 2e3b386c..3bd9d947 100644 --- a/docs/genericSecret.python.md +++ b/docs/genericSecret.python.md @@ -4,7 +4,7 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers @@ -45,7 +45,7 @@ genericSecret.GenericSecret( | path | str | Full path where the generic secret will be written. | | delete_all_versions | typing.Union[bool, cdktf.IResolvable] | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disable_read | typing.Union[bool, cdktf.IResolvable] | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- @@ -668,7 +668,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -1045,7 +1045,7 @@ genericSecret.GenericSecretConfig( | path | str | Full path where the generic secret will be written. | | delete_all_versions | typing.Union[bool, cdktf.IResolvable] | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disable_read | typing.Union[bool, cdktf.IResolvable] | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1130,7 +1130,7 @@ data_json: str JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -1144,7 +1144,7 @@ path: str Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -1158,7 +1158,7 @@ delete_all_versions: typing.Union[bool, IResolvable] Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -1172,7 +1172,7 @@ disable_read: typing.Union[bool, IResolvable] Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -1184,7 +1184,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1201,7 +1201,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/genericSecret.typescript.md b/docs/genericSecret.typescript.md index bfeb5caf..dc202443 100644 --- a/docs/genericSecret.typescript.md +++ b/docs/genericSecret.typescript.md @@ -4,7 +4,7 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -858,7 +858,7 @@ const genericSecretConfig: genericSecret.GenericSecretConfig = { ... } | path | string | Full path where the generic secret will be written. | | deleteAllVersions | boolean \| cdktf.IResolvable | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disableRead | boolean \| cdktf.IResolvable | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -943,7 +943,7 @@ public readonly dataJson: string; JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -957,7 +957,7 @@ public readonly path: string; Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -971,7 +971,7 @@ public readonly deleteAllVersions: boolean | IResolvable; Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -985,7 +985,7 @@ public readonly disableRead: boolean | IResolvable; Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -997,7 +997,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1014,7 +1014,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/githubAuthBackend.csharp.md b/docs/githubAuthBackend.csharp.md index 08773828..83977c86 100644 --- a/docs/githubAuthBackend.csharp.md +++ b/docs/githubAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers @@ -599,7 +599,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1252,7 +1252,7 @@ new GithubAuthBackendConfig { | BaseUrl | string | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | Description | string | Specifies the description of the mount. This overrides the current stored value, if any. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | OrganizationId | double | The ID of the organization users must be part of. | | Path | string | Path where the auth backend is mounted. | @@ -1265,7 +1265,7 @@ new GithubAuthBackendConfig { | TokenPolicies | string[] | Generated Token's Policies. | | TokenTtl | double | The initial ttl of the token to generate in seconds. | | TokenType | string | The type of token to generate, service or batch. | -| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1349,7 +1349,7 @@ public string Organization { get; set; } The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1363,7 +1363,7 @@ public string BaseUrl { get; set; } The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1377,7 +1377,7 @@ public string Description { get; set; } Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1391,7 +1391,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1403,7 +1403,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1420,7 +1420,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1436,7 +1436,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1450,7 +1450,7 @@ public string Path { get; set; } Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1464,7 +1464,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1478,7 +1478,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1492,7 +1492,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1506,7 +1506,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1520,7 +1520,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1534,7 +1534,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1548,7 +1548,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1562,7 +1562,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1576,7 +1576,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1588,7 +1588,7 @@ public object Tune { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1615,14 +1615,14 @@ new GithubAuthBackendTune { | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1634,7 +1634,7 @@ public string[] AllowedResponseHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1646,7 +1646,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1658,7 +1658,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1670,7 +1670,7 @@ public string DefaultLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -1682,7 +1682,7 @@ public string ListingVisibility { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -1694,7 +1694,7 @@ public string MaxLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -1706,7 +1706,7 @@ public string[] PassthroughRequestHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -1718,7 +1718,7 @@ public string TokenType { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- diff --git a/docs/githubAuthBackend.go.md b/docs/githubAuthBackend.go.md index d7b5f967..5060cea5 100644 --- a/docs/githubAuthBackend.go.md +++ b/docs/githubAuthBackend.go.md @@ -4,12 +4,12 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" githubauthbackend.NewGithubAuthBackend(scope Construct, id *string, config GithubAuthBackendConfig) GithubAuthBackend ``` @@ -510,7 +510,7 @@ func ResetTune() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" githubauthbackend.GithubAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -542,7 +542,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" githubauthbackend.GithubAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -556,7 +556,7 @@ githubauthbackend.GithubAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" githubauthbackend.GithubAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -570,7 +570,7 @@ githubauthbackend.GithubAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" githubauthbackend.GithubAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -599,7 +599,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1206,7 +1206,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" &githubauthbackend.GithubAuthBackendConfig { Connection: interface{}, @@ -1252,7 +1252,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" | BaseUrl | *string | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | Description | *string | Specifies the description of the mount. This overrides the current stored value, if any. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | OrganizationId | *f64 | The ID of the organization users must be part of. | | Path | *string | Path where the auth backend is mounted. | @@ -1265,7 +1265,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" | TokenPolicies | *[]*string | Generated Token's Policies. | | TokenTtl | *f64 | The initial ttl of the token to generate in seconds. | | TokenType | *string | The type of token to generate, service or batch. | -| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1349,7 +1349,7 @@ Organization *string The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1363,7 +1363,7 @@ BaseUrl *string The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1377,7 +1377,7 @@ Description *string Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1391,7 +1391,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1403,7 +1403,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1420,7 +1420,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1436,7 +1436,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1450,7 +1450,7 @@ Path *string Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1464,7 +1464,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1478,7 +1478,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1492,7 +1492,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1506,7 +1506,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1520,7 +1520,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1534,7 +1534,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1548,7 +1548,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1562,7 +1562,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1576,7 +1576,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1588,7 +1588,7 @@ Tune interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1597,7 +1597,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" &githubauthbackend.GithubAuthBackendTune { AllowedResponseHeaders: *[]*string, @@ -1615,14 +1615,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1634,7 +1634,7 @@ AllowedResponseHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1646,7 +1646,7 @@ AuditNonHmacRequestKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1658,7 +1658,7 @@ AuditNonHmacResponseKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1670,7 +1670,7 @@ DefaultLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -1682,7 +1682,7 @@ ListingVisibility *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -1694,7 +1694,7 @@ MaxLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -1706,7 +1706,7 @@ PassthroughRequestHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -1718,7 +1718,7 @@ TokenType *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- @@ -1729,7 +1729,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" githubauthbackend.NewGithubAuthBackendTuneList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) GithubAuthBackendTuneList ``` @@ -1889,7 +1889,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" githubauthbackend.NewGithubAuthBackendTuneOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) GithubAuthBackendTuneOutputReference ``` diff --git a/docs/githubAuthBackend.java.md b/docs/githubAuthBackend.java.md index 489cf01e..9d631076 100644 --- a/docs/githubAuthBackend.java.md +++ b/docs/githubAuthBackend.java.md @@ -4,7 +4,7 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers @@ -62,7 +62,7 @@ GithubAuthBackend.Builder.create(Construct scope, java.lang.String id) | baseUrl | java.lang.String | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | java.lang.String | Specifies the description of the mount. This overrides the current stored value, if any. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | organizationId | java.lang.Number | The ID of the organization users must be part of. | | path | java.lang.String | Path where the auth backend is mounted. | @@ -75,7 +75,7 @@ GithubAuthBackend.Builder.create(Construct scope, java.lang.String id) | tokenPolicies | java.util.List | Generated Token's Policies. | | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -145,7 +145,7 @@ Must be unique amongst siblings in the same scope The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -196,7 +196,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -208,7 +208,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -308,7 +308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -875,7 +875,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1535,7 +1535,7 @@ GithubAuthBackendConfig.builder() | baseUrl | java.lang.String | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | java.lang.String | Specifies the description of the mount. This overrides the current stored value, if any. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | organizationId | java.lang.Number | The ID of the organization users must be part of. | | path | java.lang.String | Path where the auth backend is mounted. | @@ -1548,7 +1548,7 @@ GithubAuthBackendConfig.builder() | tokenPolicies | java.util.List | Generated Token's Policies. | | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1632,7 +1632,7 @@ public java.lang.String getOrganization(); The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1646,7 +1646,7 @@ public java.lang.String getBaseUrl(); The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1660,7 +1660,7 @@ public java.lang.String getDescription(); Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1674,7 +1674,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1686,7 +1686,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1703,7 +1703,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1719,7 +1719,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1733,7 +1733,7 @@ public java.lang.String getPath(); Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1747,7 +1747,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1761,7 +1761,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1775,7 +1775,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1789,7 +1789,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1803,7 +1803,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1817,7 +1817,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1831,7 +1831,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1845,7 +1845,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1859,7 +1859,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1871,7 +1871,7 @@ public java.lang.Object getTune(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1898,14 +1898,14 @@ GithubAuthBackendTune.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1917,7 +1917,7 @@ public java.util.List getAllowedResponseHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1929,7 +1929,7 @@ public java.util.List getAuditNonHmacRequestKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1941,7 +1941,7 @@ public java.util.List getAuditNonHmacResponseKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1953,7 +1953,7 @@ public java.lang.String getDefaultLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -1965,7 +1965,7 @@ public java.lang.String getListingVisibility(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -1977,7 +1977,7 @@ public java.lang.String getMaxLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -1989,7 +1989,7 @@ public java.util.List getPassthroughRequestHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -2001,7 +2001,7 @@ public java.lang.String getTokenType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- diff --git a/docs/githubAuthBackend.python.md b/docs/githubAuthBackend.python.md index c878e79b..b14cfcc4 100644 --- a/docs/githubAuthBackend.python.md +++ b/docs/githubAuthBackend.python.md @@ -4,7 +4,7 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers @@ -57,7 +57,7 @@ githubAuthBackend.GithubAuthBackend( | base_url | str | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | str | Specifies the description of the mount. This overrides the current stored value, if any. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | | organization_id | typing.Union[int, float] | The ID of the organization users must be part of. | | path | str | Path where the auth backend is mounted. | @@ -70,7 +70,7 @@ githubAuthBackend.GithubAuthBackend( | token_policies | typing.List[str] | Generated Token's Policies. | | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | -| tune | typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -203,7 +203,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -918,7 +918,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1571,7 +1571,7 @@ githubAuthBackend.GithubAuthBackendConfig( | base_url | str | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | str | Specifies the description of the mount. This overrides the current stored value, if any. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | | organization_id | typing.Union[int, float] | The ID of the organization users must be part of. | | path | str | Path where the auth backend is mounted. | @@ -1584,7 +1584,7 @@ githubAuthBackend.GithubAuthBackendConfig( | token_policies | typing.List[str] | Generated Token's Policies. | | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | -| tune | typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1668,7 +1668,7 @@ organization: str The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1682,7 +1682,7 @@ base_url: str The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1696,7 +1696,7 @@ description: str Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1710,7 +1710,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1722,7 +1722,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1739,7 +1739,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1755,7 +1755,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1769,7 +1769,7 @@ path: str Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1783,7 +1783,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1797,7 +1797,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1811,7 +1811,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1825,7 +1825,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1839,7 +1839,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1853,7 +1853,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1867,7 +1867,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1881,7 +1881,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1895,7 +1895,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1907,7 +1907,7 @@ tune: typing.Union[IResolvable, typing.List[GithubAuthBackendTune]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1934,14 +1934,14 @@ githubAuthBackend.GithubAuthBackendTune( | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1953,7 +1953,7 @@ allowed_response_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1965,7 +1965,7 @@ audit_non_hmac_request_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1977,7 +1977,7 @@ audit_non_hmac_response_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1989,7 +1989,7 @@ default_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -2001,7 +2001,7 @@ listing_visibility: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -2013,7 +2013,7 @@ max_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -2025,7 +2025,7 @@ passthrough_request_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -2037,7 +2037,7 @@ token_type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- diff --git a/docs/githubAuthBackend.typescript.md b/docs/githubAuthBackend.typescript.md index 230846ee..149517b8 100644 --- a/docs/githubAuthBackend.typescript.md +++ b/docs/githubAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers @@ -599,7 +599,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1226,7 +1226,7 @@ const githubAuthBackendConfig: githubAuthBackend.GithubAuthBackendConfig = { ... | baseUrl | string | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | string | Specifies the description of the mount. This overrides the current stored value, if any. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | string | Target namespace. (requires Enterprise). | | organizationId | number | The ID of the organization users must be part of. | | path | string | Path where the auth backend is mounted. | @@ -1239,7 +1239,7 @@ const githubAuthBackendConfig: githubAuthBackend.GithubAuthBackendConfig = { ... | tokenPolicies | string[] | Generated Token's Policies. | | tokenTtl | number | The initial ttl of the token to generate in seconds. | | tokenType | string | The type of token to generate, service or batch. | -| tune | cdktf.IResolvable \| GithubAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | cdktf.IResolvable \| GithubAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1323,7 +1323,7 @@ public readonly organization: string; The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1337,7 +1337,7 @@ public readonly baseUrl: string; The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1351,7 +1351,7 @@ public readonly description: string; Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1365,7 +1365,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1377,7 +1377,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1394,7 +1394,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1410,7 +1410,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1424,7 +1424,7 @@ public readonly path: string; Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1438,7 +1438,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1452,7 +1452,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1466,7 +1466,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1480,7 +1480,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1494,7 +1494,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1508,7 +1508,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1522,7 +1522,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1536,7 +1536,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1550,7 +1550,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1562,7 +1562,7 @@ public readonly tune: IResolvable | GithubAuthBackendTune[]; - *Type:* cdktf.IResolvable | GithubAuthBackendTune[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1580,14 +1580,14 @@ const githubAuthBackendTune: githubAuthBackend.GithubAuthBackendTune = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1599,7 +1599,7 @@ public readonly allowedResponseHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1611,7 +1611,7 @@ public readonly auditNonHmacRequestKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1623,7 +1623,7 @@ public readonly auditNonHmacResponseKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1635,7 +1635,7 @@ public readonly defaultLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -1647,7 +1647,7 @@ public readonly listingVisibility: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -1659,7 +1659,7 @@ public readonly maxLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -1671,7 +1671,7 @@ public readonly passthroughRequestHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -1683,7 +1683,7 @@ public readonly tokenType: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- diff --git a/docs/githubTeam.csharp.md b/docs/githubTeam.csharp.md index b202fb16..60f9597e 100644 --- a/docs/githubTeam.csharp.md +++ b/docs/githubTeam.csharp.md @@ -4,7 +4,7 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team vault_github_team}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new GithubTeamConfig { | Provisioners | object[] | *No description.* | | Team | string | GitHub team name in "slugified" format. | | Backend | string | Auth backend to which team mapping will be configured. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Policies to be assigned to this team. | @@ -922,7 +922,7 @@ public string Team { get; set; } GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#team GithubTeam#team} --- @@ -936,7 +936,7 @@ public string Backend { get; set; } Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -979,7 +979,7 @@ public string[] Policies { get; set; } Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubTeam.go.md b/docs/githubTeam.go.md index e15b1d4d..33f8698c 100644 --- a/docs/githubTeam.go.md +++ b/docs/githubTeam.go.md @@ -4,12 +4,12 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team vault_github_team}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubteam" githubteam.NewGithubTeam(scope Construct, id *string, config GithubTeamConfig) GithubTeam ``` @@ -406,7 +406,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubteam" githubteam.GithubTeam_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubteam" githubteam.GithubTeam_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ githubteam.GithubTeam_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubteam" githubteam.GithubTeam_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ githubteam.GithubTeam_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubteam" githubteam.GithubTeam_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -805,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubteam" &githubteam.GithubTeamConfig { Connection: interface{}, @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubteam" | Provisioners | *[]interface{} | *No description.* | | Team | *string | GitHub team name in "slugified" format. | | Backend | *string | Auth backend to which team mapping will be configured. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Policies to be assigned to this team. | @@ -922,7 +922,7 @@ Team *string GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#team GithubTeam#team} --- @@ -936,7 +936,7 @@ Backend *string Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -979,7 +979,7 @@ Policies *[]*string Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubTeam.java.md b/docs/githubTeam.java.md index 50ff375d..ca8359ef 100644 --- a/docs/githubTeam.java.md +++ b/docs/githubTeam.java.md @@ -4,7 +4,7 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team vault_github_team}. #### Initializers @@ -44,7 +44,7 @@ GithubTeam.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | team | java.lang.String | GitHub team name in "slugified" format. | | backend | java.lang.String | Auth backend to which team mapping will be configured. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to be assigned to this team. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#team GithubTeam#team} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#policies GithubTeam#policies} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -957,7 +957,7 @@ GithubTeamConfig.builder() | provisioners | java.util.List | *No description.* | | team | java.lang.String | GitHub team name in "slugified" format. | | backend | java.lang.String | Auth backend to which team mapping will be configured. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to be assigned to this team. | @@ -1043,7 +1043,7 @@ public java.lang.String getTeam(); GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#team GithubTeam#team} --- @@ -1057,7 +1057,7 @@ public java.lang.String getBackend(); Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -1100,7 +1100,7 @@ public java.util.List getPolicies(); Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubTeam.python.md b/docs/githubTeam.python.md index ce4ad3cc..1e325083 100644 --- a/docs/githubTeam.python.md +++ b/docs/githubTeam.python.md @@ -4,7 +4,7 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team vault_github_team}. #### Initializers @@ -42,7 +42,7 @@ githubTeam.GithubTeam( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | team | str | GitHub team name in "slugified" format. | | backend | str | Auth backend to which team mapping will be configured. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to be assigned to this team. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#team GithubTeam#team} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#policies GithubTeam#policies} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ githubTeam.GithubTeamConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | team | str | GitHub team name in "slugified" format. | | backend | str | Auth backend to which team mapping will be configured. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to be assigned to this team. | @@ -1083,7 +1083,7 @@ team: str GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#team GithubTeam#team} --- @@ -1097,7 +1097,7 @@ backend: str Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -1140,7 +1140,7 @@ policies: typing.List[str] Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubTeam.typescript.md b/docs/githubTeam.typescript.md index a2116349..89ba0e33 100644 --- a/docs/githubTeam.typescript.md +++ b/docs/githubTeam.typescript.md @@ -4,7 +4,7 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team vault_github_team}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const githubTeamConfig: githubTeam.GithubTeamConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | team | string | GitHub team name in "slugified" format. | | backend | string | Auth backend to which team mapping will be configured. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Policies to be assigned to this team. | @@ -909,7 +909,7 @@ public readonly team: string; GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#team GithubTeam#team} --- @@ -923,7 +923,7 @@ public readonly backend: string; Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -966,7 +966,7 @@ public readonly policies: string[]; Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubUser.csharp.md b/docs/githubUser.csharp.md index 88f8cf1c..1c3eb4d0 100644 --- a/docs/githubUser.csharp.md +++ b/docs/githubUser.csharp.md @@ -4,7 +4,7 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user vault_github_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new GithubUserConfig { | Provisioners | object[] | *No description.* | | User | string | GitHub user name. | | Backend | string | Auth backend to which user mapping will be congigured. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Policies to be assigned to this user. | @@ -922,7 +922,7 @@ public string User { get; set; } GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#user GithubUser#user} --- @@ -936,7 +936,7 @@ public string Backend { get; set; } Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -979,7 +979,7 @@ public string[] Policies { get; set; } Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/githubUser.go.md b/docs/githubUser.go.md index 8c51507e..bc3b3cc5 100644 --- a/docs/githubUser.go.md +++ b/docs/githubUser.go.md @@ -4,12 +4,12 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user vault_github_user}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubuser" githubuser.NewGithubUser(scope Construct, id *string, config GithubUserConfig) GithubUser ``` @@ -406,7 +406,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubuser" githubuser.GithubUser_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubuser" githubuser.GithubUser_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ githubuser.GithubUser_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubuser" githubuser.GithubUser_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ githubuser.GithubUser_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubuser" githubuser.GithubUser_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -805,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubuser" &githubuser.GithubUserConfig { Connection: interface{}, @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/githubuser" | Provisioners | *[]interface{} | *No description.* | | User | *string | GitHub user name. | | Backend | *string | Auth backend to which user mapping will be congigured. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Policies to be assigned to this user. | @@ -922,7 +922,7 @@ User *string GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#user GithubUser#user} --- @@ -936,7 +936,7 @@ Backend *string Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -979,7 +979,7 @@ Policies *[]*string Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/githubUser.java.md b/docs/githubUser.java.md index 05c6d9a8..c6c2cea4 100644 --- a/docs/githubUser.java.md +++ b/docs/githubUser.java.md @@ -4,7 +4,7 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user vault_github_user}. #### Initializers @@ -44,7 +44,7 @@ GithubUser.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | user | java.lang.String | GitHub user name. | | backend | java.lang.String | Auth backend to which user mapping will be congigured. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to be assigned to this user. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#user GithubUser#user} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#policies GithubUser#policies} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -957,7 +957,7 @@ GithubUserConfig.builder() | provisioners | java.util.List | *No description.* | | user | java.lang.String | GitHub user name. | | backend | java.lang.String | Auth backend to which user mapping will be congigured. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to be assigned to this user. | @@ -1043,7 +1043,7 @@ public java.lang.String getUser(); GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#user GithubUser#user} --- @@ -1057,7 +1057,7 @@ public java.lang.String getBackend(); Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -1100,7 +1100,7 @@ public java.util.List getPolicies(); Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/githubUser.python.md b/docs/githubUser.python.md index 5b28c606..fc68b5f6 100644 --- a/docs/githubUser.python.md +++ b/docs/githubUser.python.md @@ -4,7 +4,7 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user vault_github_user}. #### Initializers @@ -42,7 +42,7 @@ githubUser.GithubUser( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | user | str | GitHub user name. | | backend | str | Auth backend to which user mapping will be congigured. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to be assigned to this user. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#user GithubUser#user} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#policies GithubUser#policies} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ githubUser.GithubUserConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | user | str | GitHub user name. | | backend | str | Auth backend to which user mapping will be congigured. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to be assigned to this user. | @@ -1083,7 +1083,7 @@ user: str GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#user GithubUser#user} --- @@ -1097,7 +1097,7 @@ backend: str Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -1140,7 +1140,7 @@ policies: typing.List[str] Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/githubUser.typescript.md b/docs/githubUser.typescript.md index e2567cad..e15bcabe 100644 --- a/docs/githubUser.typescript.md +++ b/docs/githubUser.typescript.md @@ -4,7 +4,7 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user vault_github_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const githubUserConfig: githubUser.GithubUserConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | user | string | GitHub user name. | | backend | string | Auth backend to which user mapping will be congigured. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Policies to be assigned to this user. | @@ -909,7 +909,7 @@ public readonly user: string; GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#user GithubUser#user} --- @@ -923,7 +923,7 @@ public readonly backend: string; Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -966,7 +966,7 @@ public readonly policies: string[]; Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/identityEntity.csharp.md b/docs/identityEntity.csharp.md index 25b38645..7345201c 100644 --- a/docs/identityEntity.csharp.md +++ b/docs/identityEntity.csharp.md @@ -4,7 +4,7 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -903,7 +903,7 @@ new IdentityEntityConfig { | Provisioners | object[] | *No description.* | | Disabled | object | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | ExternalPolicies | object | Manage policies externally through `vault_identity_entity_policies`. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. | | Metadata | System.Collections.Generic.IDictionary | Metadata to be associated with the entity. | | Name | string | Name of the entity. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -991,7 +991,7 @@ public object Disabled { get; set; } Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -1005,7 +1005,7 @@ public object ExternalPolicies { get; set; } Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1017,7 +1017,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ public System.Collections.Generic.IDictionary Metadata { get; se Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1048,7 +1048,7 @@ public string Name { get; set; } Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1062,7 +1062,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1076,7 +1076,7 @@ public string[] Policies { get; set; } Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntity.go.md b/docs/identityEntity.go.md index 091fa477..ddf442ed 100644 --- a/docs/identityEntity.go.md +++ b/docs/identityEntity.go.md @@ -4,12 +4,12 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentity" identityentity.NewIdentityEntity(scope Construct, id *string, config IdentityEntityConfig) IdentityEntity ``` @@ -427,7 +427,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentity" identityentity.IdentityEntity_IsConstruct(x interface{}) *bool ``` @@ -459,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentity" identityentity.IdentityEntity_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +473,7 @@ identityentity.IdentityEntity_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentity" identityentity.IdentityEntity_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +487,7 @@ identityentity.IdentityEntity_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentity" identityentity.IdentityEntity_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -516,7 +516,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -870,7 +870,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentity" &identityentity.IdentityEntityConfig { Connection: interface{}, @@ -903,7 +903,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentity" | Provisioners | *[]interface{} | *No description.* | | Disabled | interface{} | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | ExternalPolicies | interface{} | Manage policies externally through `vault_identity_entity_policies`. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. | | Metadata | *map[string]*string | Metadata to be associated with the entity. | | Name | *string | Name of the entity. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -991,7 +991,7 @@ Disabled interface{} Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -1005,7 +1005,7 @@ ExternalPolicies interface{} Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1017,7 +1017,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ Metadata *map[string]*string Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1048,7 +1048,7 @@ Name *string Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1062,7 +1062,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1076,7 +1076,7 @@ Policies *[]*string Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntity.java.md b/docs/identityEntity.java.md index 1ab98457..0222df6e 100644 --- a/docs/identityEntity.java.md +++ b/docs/identityEntity.java.md @@ -4,7 +4,7 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers @@ -48,7 +48,7 @@ IdentityEntity.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | disabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | externalPolicies | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage policies externally through `vault_identity_entity_policies`. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | java.util.Map | Metadata to be associated with the entity. | | name | java.lang.String | Name of the entity. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- @@ -659,7 +659,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -1052,7 +1052,7 @@ IdentityEntityConfig.builder() | provisioners | java.util.List | *No description.* | | disabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | externalPolicies | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage policies externally through `vault_identity_entity_policies`. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | java.util.Map | Metadata to be associated with the entity. | | name | java.lang.String | Name of the entity. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1140,7 +1140,7 @@ public java.lang.Object getDisabled(); Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -1154,7 +1154,7 @@ public java.lang.Object getExternalPolicies(); Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1166,7 +1166,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ public java.util.Map getMetadata(); Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1197,7 +1197,7 @@ public java.lang.String getName(); Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1211,7 +1211,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1225,7 +1225,7 @@ public java.util.List getPolicies(); Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntity.python.md b/docs/identityEntity.python.md index 9fddbf22..a7cff7df 100644 --- a/docs/identityEntity.python.md +++ b/docs/identityEntity.python.md @@ -4,7 +4,7 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers @@ -44,7 +44,7 @@ identityEntity.IdentityEntity( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | disabled | typing.Union[bool, cdktf.IResolvable] | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | external_policies | typing.Union[bool, cdktf.IResolvable] | Manage policies externally through `vault_identity_entity_policies`. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | typing.Mapping[str] | Metadata to be associated with the entity. | | name | str | Name of the entity. | | namespace | str | Target namespace. (requires Enterprise). | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -149,7 +149,7 @@ If you experience problems setting this value it might not be settable. Please t Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- @@ -701,7 +701,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -1088,7 +1088,7 @@ identityEntity.IdentityEntityConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | disabled | typing.Union[bool, cdktf.IResolvable] | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | external_policies | typing.Union[bool, cdktf.IResolvable] | Manage policies externally through `vault_identity_entity_policies`. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | typing.Mapping[str] | Metadata to be associated with the entity. | | name | str | Name of the entity. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1176,7 +1176,7 @@ disabled: typing.Union[bool, IResolvable] Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -1190,7 +1190,7 @@ external_policies: typing.Union[bool, IResolvable] Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1202,7 +1202,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1219,7 +1219,7 @@ metadata: typing.Mapping[str] Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1233,7 +1233,7 @@ name: str Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1247,7 +1247,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1261,7 +1261,7 @@ policies: typing.List[str] Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntity.typescript.md b/docs/identityEntity.typescript.md index b0db50a2..07d1805e 100644 --- a/docs/identityEntity.typescript.md +++ b/docs/identityEntity.typescript.md @@ -4,7 +4,7 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -888,7 +888,7 @@ const identityEntityConfig: identityEntity.IdentityEntityConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | disabled | boolean \| cdktf.IResolvable | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | externalPolicies | boolean \| cdktf.IResolvable | Manage policies externally through `vault_identity_entity_policies`. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | {[ key: string ]: string} | Metadata to be associated with the entity. | | name | string | Name of the entity. | | namespace | string | Target namespace. (requires Enterprise). | @@ -976,7 +976,7 @@ public readonly disabled: boolean | IResolvable; Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -990,7 +990,7 @@ public readonly externalPolicies: boolean | IResolvable; Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1002,7 +1002,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1019,7 +1019,7 @@ public readonly metadata: {[ key: string ]: string}; Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1033,7 +1033,7 @@ public readonly name: string; Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1047,7 +1047,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1061,7 +1061,7 @@ public readonly policies: string[]; Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntityAlias.csharp.md b/docs/identityEntityAlias.csharp.md index 89fb3a63..8bfd75a4 100644 --- a/docs/identityEntityAlias.csharp.md +++ b/docs/identityEntityAlias.csharp.md @@ -4,7 +4,7 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -854,7 +854,7 @@ new IdentityEntityAliasConfig { | MountAccessor | string | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | Name | string | Name of the entity alias. | | CustomMetadata | System.Collections.Generic.IDictionary | Custom metadata to be associated with this alias. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ public string CanonicalId { get; set; } ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -953,7 +953,7 @@ public string MountAccessor { get; set; } Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -967,7 +967,7 @@ public string Name { get; set; } Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -981,7 +981,7 @@ public System.Collections.Generic.IDictionary CustomMetadata { g Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -993,7 +993,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityAlias.go.md b/docs/identityEntityAlias.go.md index 9792ebc1..9eee6e60 100644 --- a/docs/identityEntityAlias.go.md +++ b/docs/identityEntityAlias.go.md @@ -4,12 +4,12 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentityalias" identityentityalias.NewIdentityEntityAlias(scope Construct, id *string, config IdentityEntityAliasConfig) IdentityEntityAlias ``` @@ -399,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentityalias" identityentityalias.IdentityEntityAlias_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentityalias" identityentityalias.IdentityEntityAlias_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ identityentityalias.IdentityEntityAlias_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentityalias" identityentityalias.IdentityEntityAlias_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ identityentityalias.IdentityEntityAlias_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentityalias" identityentityalias.IdentityEntityAlias_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -820,7 +820,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentityalias" &identityentityalias.IdentityEntityAliasConfig { Connection: interface{}, @@ -854,7 +854,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentityalias" | MountAccessor | *string | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | Name | *string | Name of the entity alias. | | CustomMetadata | *map[string]*string | Custom metadata to be associated with this alias. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ CanonicalId *string ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -953,7 +953,7 @@ MountAccessor *string Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -967,7 +967,7 @@ Name *string Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -981,7 +981,7 @@ CustomMetadata *map[string]*string Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -993,7 +993,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityAlias.java.md b/docs/identityEntityAlias.java.md index 2d1bae75..53716151 100644 --- a/docs/identityEntityAlias.java.md +++ b/docs/identityEntityAlias.java.md @@ -4,7 +4,7 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers @@ -47,7 +47,7 @@ IdentityEntityAlias.Builder.create(Construct scope, java.lang.String id) | mountAccessor | java.lang.String | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | java.lang.String | Name of the entity alias. | | customMetadata | java.util.Map | Custom metadata to be associated with this alias. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- @@ -617,7 +617,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -987,7 +987,7 @@ IdentityEntityAliasConfig.builder() | mountAccessor | java.lang.String | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | java.lang.String | Name of the entity alias. | | customMetadata | java.util.Map | Custom metadata to be associated with this alias. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1072,7 +1072,7 @@ public java.lang.String getCanonicalId(); ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -1086,7 +1086,7 @@ public java.lang.String getMountAccessor(); Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -1100,7 +1100,7 @@ public java.lang.String getName(); Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -1114,7 +1114,7 @@ public java.util.Map getCustomMetadata(); Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -1126,7 +1126,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1143,7 +1143,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityAlias.python.md b/docs/identityEntityAlias.python.md index 3e87d81b..2b5a97b0 100644 --- a/docs/identityEntityAlias.python.md +++ b/docs/identityEntityAlias.python.md @@ -4,7 +4,7 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers @@ -45,7 +45,7 @@ identityEntityAlias.IdentityEntityAlias( | mount_accessor | str | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | str | Name of the entity alias. | | custom_metadata | typing.Mapping[str] | Custom metadata to be associated with this alias. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -1027,7 +1027,7 @@ identityEntityAlias.IdentityEntityAliasConfig( | mount_accessor | str | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | str | Name of the entity alias. | | custom_metadata | typing.Mapping[str] | Custom metadata to be associated with this alias. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1112,7 +1112,7 @@ canonical_id: str ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -1126,7 +1126,7 @@ mount_accessor: str Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -1140,7 +1140,7 @@ name: str Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -1154,7 +1154,7 @@ custom_metadata: typing.Mapping[str] Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -1166,7 +1166,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityAlias.typescript.md b/docs/identityEntityAlias.typescript.md index b4101baf..4463abc9 100644 --- a/docs/identityEntityAlias.typescript.md +++ b/docs/identityEntityAlias.typescript.md @@ -4,7 +4,7 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -840,7 +840,7 @@ const identityEntityAliasConfig: identityEntityAlias.IdentityEntityAliasConfig = | mountAccessor | string | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | string | Name of the entity alias. | | customMetadata | {[ key: string ]: string} | Custom metadata to be associated with this alias. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -925,7 +925,7 @@ public readonly canonicalId: string; ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -939,7 +939,7 @@ public readonly mountAccessor: string; Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -953,7 +953,7 @@ public readonly name: string; Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -967,7 +967,7 @@ public readonly customMetadata: {[ key: string ]: string}; Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -979,7 +979,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -996,7 +996,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityPolicies.csharp.md b/docs/identityEntityPolicies.csharp.md index b03d70fa..26a8bfea 100644 --- a/docs/identityEntityPolicies.csharp.md +++ b/docs/identityEntityPolicies.csharp.md @@ -4,7 +4,7 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -841,7 +841,7 @@ new IdentityEntityPoliciesConfig { | EntityId | string | ID of the entity. | | Policies | string[] | Policies to be tied to the entity. | | Exclusive | object | Should the resource manage policies exclusively. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -926,7 +926,7 @@ public string EntityId { get; set; } ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -940,7 +940,7 @@ public string[] Policies { get; set; } Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -954,7 +954,7 @@ public object Exclusive { get; set; } Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -966,7 +966,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityEntityPolicies.go.md b/docs/identityEntityPolicies.go.md index 7424994b..ca8c624f 100644 --- a/docs/identityEntityPolicies.go.md +++ b/docs/identityEntityPolicies.go.md @@ -4,12 +4,12 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentitypolicies" identityentitypolicies.NewIdentityEntityPolicies(scope Construct, id *string, config IdentityEntityPoliciesConfig) IdentityEntityPolicies ``` @@ -399,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentitypolicies" identityentitypolicies.IdentityEntityPolicies_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentitypolicies" identityentitypolicies.IdentityEntityPolicies_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ identityentitypolicies.IdentityEntityPolicies_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentitypolicies" identityentitypolicies.IdentityEntityPolicies_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ identityentitypolicies.IdentityEntityPolicies_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentitypolicies" identityentitypolicies.IdentityEntityPolicies_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -809,7 +809,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentitypolicies" &identityentitypolicies.IdentityEntityPoliciesConfig { Connection: interface{}, @@ -841,7 +841,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityentitypolicie | EntityId | *string | ID of the entity. | | Policies | *[]*string | Policies to be tied to the entity. | | Exclusive | interface{} | Should the resource manage policies exclusively. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -926,7 +926,7 @@ EntityId *string ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -940,7 +940,7 @@ Policies *[]*string Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -954,7 +954,7 @@ Exclusive interface{} Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -966,7 +966,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityEntityPolicies.java.md b/docs/identityEntityPolicies.java.md index 7100ca94..bf8e80fa 100644 --- a/docs/identityEntityPolicies.java.md +++ b/docs/identityEntityPolicies.java.md @@ -4,7 +4,7 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers @@ -46,7 +46,7 @@ IdentityEntityPolicies.Builder.create(Construct scope, java.lang.String id) | entityId | java.lang.String | ID of the entity. | | policies | java.util.List | Policies to be tied to the entity. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Should the resource manage policies exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -158,7 +158,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- @@ -606,7 +606,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -964,7 +964,7 @@ IdentityEntityPoliciesConfig.builder() | entityId | java.lang.String | ID of the entity. | | policies | java.util.List | Policies to be tied to the entity. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Should the resource manage policies exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1049,7 +1049,7 @@ public java.lang.String getEntityId(); ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -1063,7 +1063,7 @@ public java.util.List getPolicies(); Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -1077,7 +1077,7 @@ public java.lang.Object getExclusive(); Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -1089,7 +1089,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1106,7 +1106,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityEntityPolicies.python.md b/docs/identityEntityPolicies.python.md index 9906ef18..b1953833 100644 --- a/docs/identityEntityPolicies.python.md +++ b/docs/identityEntityPolicies.python.md @@ -4,7 +4,7 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers @@ -43,7 +43,7 @@ identityEntityPolicies.IdentityEntityPolicies( | entity_id | str | ID of the entity. | | policies | typing.List[str] | Policies to be tied to the entity. | | exclusive | typing.Union[bool, cdktf.IResolvable] | Should the resource manage policies exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -1002,7 +1002,7 @@ identityEntityPolicies.IdentityEntityPoliciesConfig( | entity_id | str | ID of the entity. | | policies | typing.List[str] | Policies to be tied to the entity. | | exclusive | typing.Union[bool, cdktf.IResolvable] | Should the resource manage policies exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1087,7 +1087,7 @@ entity_id: str ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -1101,7 +1101,7 @@ policies: typing.List[str] Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -1115,7 +1115,7 @@ exclusive: typing.Union[bool, IResolvable] Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -1127,7 +1127,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1144,7 +1144,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityEntityPolicies.typescript.md b/docs/identityEntityPolicies.typescript.md index 3a726373..e04f7ac4 100644 --- a/docs/identityEntityPolicies.typescript.md +++ b/docs/identityEntityPolicies.typescript.md @@ -4,7 +4,7 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -828,7 +828,7 @@ const identityEntityPoliciesConfig: identityEntityPolicies.IdentityEntityPolicie | entityId | string | ID of the entity. | | policies | string[] | Policies to be tied to the entity. | | exclusive | boolean \| cdktf.IResolvable | Should the resource manage policies exclusively. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -913,7 +913,7 @@ public readonly entityId: string; ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -927,7 +927,7 @@ public readonly policies: string[]; Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -941,7 +941,7 @@ public readonly exclusive: boolean | IResolvable; Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -953,7 +953,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -970,7 +970,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityGroup.csharp.md b/docs/identityGroup.csharp.md index 3a4ab3c3..3d7a08d0 100644 --- a/docs/identityGroup.csharp.md +++ b/docs/identityGroup.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group vault_identity_group}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1024,7 +1024,7 @@ new IdentityGroupConfig { | ExternalMemberEntityIds | object | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | ExternalMemberGroupIds | object | Manage member groups externally through `vault_identity_group_member_group_ids`. | | ExternalPolicies | object | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. | | MemberEntityIds | string[] | Entity IDs to be assigned as group members. | | MemberGroupIds | string[] | Group IDs to be assigned as group members. | | Metadata | System.Collections.Generic.IDictionary | Metadata to be associated with the group. | @@ -1115,7 +1115,7 @@ public object ExternalMemberEntityIds { get; set; } Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1129,7 +1129,7 @@ public object ExternalMemberGroupIds { get; set; } Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1143,7 +1143,7 @@ public object ExternalPolicies { get; set; } Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1155,7 +1155,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1172,7 +1172,7 @@ public string[] MemberEntityIds { get; set; } Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1186,7 +1186,7 @@ public string[] MemberGroupIds { get; set; } Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1200,7 +1200,7 @@ public System.Collections.Generic.IDictionary Metadata { get; se Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1214,7 +1214,7 @@ public string Name { get; set; } Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1228,7 +1228,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1242,7 +1242,7 @@ public string[] Policies { get; set; } Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1256,7 +1256,7 @@ public string Type { get; set; } Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroup.go.md b/docs/identityGroup.go.md index d6316909..d9f82586 100644 --- a/docs/identityGroup.go.md +++ b/docs/identityGroup.go.md @@ -4,12 +4,12 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group vault_identity_group}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroup" identitygroup.NewIdentityGroup(scope Construct, id *string, config IdentityGroupConfig) IdentityGroup ``` @@ -455,7 +455,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroup" identitygroup.IdentityGroup_IsConstruct(x interface{}) *bool ``` @@ -487,7 +487,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroup" identitygroup.IdentityGroup_IsTerraformElement(x interface{}) *bool ``` @@ -501,7 +501,7 @@ identitygroup.IdentityGroup_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroup" identitygroup.IdentityGroup_IsTerraformResource(x interface{}) *bool ``` @@ -515,7 +515,7 @@ identitygroup.IdentityGroup_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroup" identitygroup.IdentityGroup_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -544,7 +544,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -986,7 +986,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroup" &identitygroup.IdentityGroupConfig { Connection: interface{}, @@ -1024,7 +1024,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroup" | ExternalMemberEntityIds | interface{} | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | ExternalMemberGroupIds | interface{} | Manage member groups externally through `vault_identity_group_member_group_ids`. | | ExternalPolicies | interface{} | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. | | MemberEntityIds | *[]*string | Entity IDs to be assigned as group members. | | MemberGroupIds | *[]*string | Group IDs to be assigned as group members. | | Metadata | *map[string]*string | Metadata to be associated with the group. | @@ -1115,7 +1115,7 @@ ExternalMemberEntityIds interface{} Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1129,7 +1129,7 @@ ExternalMemberGroupIds interface{} Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1143,7 +1143,7 @@ ExternalPolicies interface{} Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1155,7 +1155,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1172,7 +1172,7 @@ MemberEntityIds *[]*string Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1186,7 +1186,7 @@ MemberGroupIds *[]*string Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1200,7 +1200,7 @@ Metadata *map[string]*string Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1214,7 +1214,7 @@ Name *string Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1228,7 +1228,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1242,7 +1242,7 @@ Policies *[]*string Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1256,7 +1256,7 @@ Type *string Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroup.java.md b/docs/identityGroup.java.md index cb76b702..9c018ef1 100644 --- a/docs/identityGroup.java.md +++ b/docs/identityGroup.java.md @@ -4,7 +4,7 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group vault_identity_group}. #### Initializers @@ -54,7 +54,7 @@ IdentityGroup.Builder.create(Construct scope, java.lang.String id) | externalMemberEntityIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | externalMemberGroupIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage member groups externally through `vault_identity_group_member_group_ids`. | | externalPolicies | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. | | memberEntityIds | java.util.List | Entity IDs to be assigned as group members. | | memberGroupIds | java.util.List | Group IDs to be assigned as group members. | | metadata | java.util.Map | Metadata to be associated with the group. | @@ -131,7 +131,7 @@ Must be unique amongst siblings in the same scope Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -172,7 +172,7 @@ If you experience problems setting this value it might not be settable. Please t Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#type IdentityGroup#type} --- @@ -736,7 +736,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1223,7 +1223,7 @@ IdentityGroupConfig.builder() | externalMemberEntityIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | externalMemberGroupIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage member groups externally through `vault_identity_group_member_group_ids`. | | externalPolicies | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. | | memberEntityIds | java.util.List | Entity IDs to be assigned as group members. | | memberGroupIds | java.util.List | Group IDs to be assigned as group members. | | metadata | java.util.Map | Metadata to be associated with the group. | @@ -1314,7 +1314,7 @@ public java.lang.Object getExternalMemberEntityIds(); Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1328,7 +1328,7 @@ public java.lang.Object getExternalMemberGroupIds(); Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1342,7 +1342,7 @@ public java.lang.Object getExternalPolicies(); Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1354,7 +1354,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1371,7 +1371,7 @@ public java.util.List getMemberEntityIds(); Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1385,7 +1385,7 @@ public java.util.List getMemberGroupIds(); Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1399,7 +1399,7 @@ public java.util.Map getMetadata(); Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1413,7 +1413,7 @@ public java.lang.String getName(); Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1427,7 +1427,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1441,7 +1441,7 @@ public java.util.List getPolicies(); Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1455,7 +1455,7 @@ public java.lang.String getType(); Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroup.python.md b/docs/identityGroup.python.md index eb11086f..6b00eeca 100644 --- a/docs/identityGroup.python.md +++ b/docs/identityGroup.python.md @@ -4,7 +4,7 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group vault_identity_group}. #### Initializers @@ -49,7 +49,7 @@ identityGroup.IdentityGroup( | external_member_entity_ids | typing.Union[bool, cdktf.IResolvable] | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | external_member_group_ids | typing.Union[bool, cdktf.IResolvable] | Manage member groups externally through `vault_identity_group_member_group_ids`. | | external_policies | typing.Union[bool, cdktf.IResolvable] | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. | | member_entity_ids | typing.List[str] | Entity IDs to be assigned as group members. | | member_group_ids | typing.List[str] | Group IDs to be assigned as group members. | | metadata | typing.Mapping[str] | Metadata to be associated with the group. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#type IdentityGroup#type} --- @@ -777,7 +777,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1257,7 +1257,7 @@ identityGroup.IdentityGroupConfig( | external_member_entity_ids | typing.Union[bool, cdktf.IResolvable] | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | external_member_group_ids | typing.Union[bool, cdktf.IResolvable] | Manage member groups externally through `vault_identity_group_member_group_ids`. | | external_policies | typing.Union[bool, cdktf.IResolvable] | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. | | member_entity_ids | typing.List[str] | Entity IDs to be assigned as group members. | | member_group_ids | typing.List[str] | Group IDs to be assigned as group members. | | metadata | typing.Mapping[str] | Metadata to be associated with the group. | @@ -1348,7 +1348,7 @@ external_member_entity_ids: typing.Union[bool, IResolvable] Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1362,7 +1362,7 @@ external_member_group_ids: typing.Union[bool, IResolvable] Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1376,7 +1376,7 @@ external_policies: typing.Union[bool, IResolvable] Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1388,7 +1388,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1405,7 +1405,7 @@ member_entity_ids: typing.List[str] Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1419,7 +1419,7 @@ member_group_ids: typing.List[str] Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1433,7 +1433,7 @@ metadata: typing.Mapping[str] Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1447,7 +1447,7 @@ name: str Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1461,7 +1461,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1475,7 +1475,7 @@ policies: typing.List[str] Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1489,7 +1489,7 @@ type: str Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroup.typescript.md b/docs/identityGroup.typescript.md index 339acb21..d40a6eb5 100644 --- a/docs/identityGroup.typescript.md +++ b/docs/identityGroup.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group vault_identity_group}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1005,7 +1005,7 @@ const identityGroupConfig: identityGroup.IdentityGroupConfig = { ... } | externalMemberEntityIds | boolean \| cdktf.IResolvable | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | externalMemberGroupIds | boolean \| cdktf.IResolvable | Manage member groups externally through `vault_identity_group_member_group_ids`. | | externalPolicies | boolean \| cdktf.IResolvable | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. | | memberEntityIds | string[] | Entity IDs to be assigned as group members. | | memberGroupIds | string[] | Group IDs to be assigned as group members. | | metadata | {[ key: string ]: string} | Metadata to be associated with the group. | @@ -1096,7 +1096,7 @@ public readonly externalMemberEntityIds: boolean | IResolvable; Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1110,7 +1110,7 @@ public readonly externalMemberGroupIds: boolean | IResolvable; Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1124,7 +1124,7 @@ public readonly externalPolicies: boolean | IResolvable; Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1136,7 +1136,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1153,7 +1153,7 @@ public readonly memberEntityIds: string[]; Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1167,7 +1167,7 @@ public readonly memberGroupIds: string[]; Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1181,7 +1181,7 @@ public readonly metadata: {[ key: string ]: string}; Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1195,7 +1195,7 @@ public readonly name: string; Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1209,7 +1209,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1223,7 +1223,7 @@ public readonly policies: string[]; Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1237,7 +1237,7 @@ public readonly type: string; Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroupAlias.csharp.md b/docs/identityGroupAlias.csharp.md index 78f8d554..511bab29 100644 --- a/docs/identityGroupAlias.csharp.md +++ b/docs/identityGroupAlias.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ new IdentityGroupAliasConfig { | CanonicalId | string | ID of the group to which this is an alias. | | MountAccessor | string | Mount accessor to which this alias belongs to. | | Name | string | Name of the group alias. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -908,7 +908,7 @@ public string CanonicalId { get; set; } ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -922,7 +922,7 @@ public string MountAccessor { get; set; } Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -936,7 +936,7 @@ public string Name { get; set; } Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupAlias.go.md b/docs/identityGroupAlias.go.md index a080ed31..ebe9c8d4 100644 --- a/docs/identityGroupAlias.go.md +++ b/docs/identityGroupAlias.go.md @@ -4,12 +4,12 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupalias" identitygroupalias.NewIdentityGroupAlias(scope Construct, id *string, config IdentityGroupAliasConfig) IdentityGroupAlias ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupalias" identitygroupalias.IdentityGroupAlias_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupalias" identitygroupalias.IdentityGroupAlias_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ identitygroupalias.IdentityGroupAlias_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupalias" identitygroupalias.IdentityGroupAlias_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ identitygroupalias.IdentityGroupAlias_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupalias" identitygroupalias.IdentityGroupAlias_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -791,7 +791,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupalias" &identitygroupalias.IdentityGroupAliasConfig { Connection: interface{}, @@ -823,7 +823,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupalias" | CanonicalId | *string | ID of the group to which this is an alias. | | MountAccessor | *string | Mount accessor to which this alias belongs to. | | Name | *string | Name of the group alias. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -908,7 +908,7 @@ CanonicalId *string ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -922,7 +922,7 @@ MountAccessor *string Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -936,7 +936,7 @@ Name *string Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupAlias.java.md b/docs/identityGroupAlias.java.md index 348333b5..e868cd62 100644 --- a/docs/identityGroupAlias.java.md +++ b/docs/identityGroupAlias.java.md @@ -4,7 +4,7 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers @@ -45,7 +45,7 @@ IdentityGroupAlias.Builder.create(Construct scope, java.lang.String id) | canonicalId | java.lang.String | ID of the group to which this is an alias. | | mountAccessor | java.lang.String | Mount accessor to which this alias belongs to. | | name | java.lang.String | Name of the group alias. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- @@ -598,7 +598,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -944,7 +944,7 @@ IdentityGroupAliasConfig.builder() | canonicalId | java.lang.String | ID of the group to which this is an alias. | | mountAccessor | java.lang.String | Mount accessor to which this alias belongs to. | | name | java.lang.String | Name of the group alias. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1029,7 +1029,7 @@ public java.lang.String getCanonicalId(); ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -1043,7 +1043,7 @@ public java.lang.String getMountAccessor(); Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -1057,7 +1057,7 @@ public java.lang.String getName(); Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupAlias.python.md b/docs/identityGroupAlias.python.md index e529bca1..3be995a1 100644 --- a/docs/identityGroupAlias.python.md +++ b/docs/identityGroupAlias.python.md @@ -4,7 +4,7 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers @@ -43,7 +43,7 @@ identityGroupAlias.IdentityGroupAlias( | canonical_id | str | ID of the group to which this is an alias. | | mount_accessor | str | Mount accessor to which this alias belongs to. | | name | str | Name of the group alias. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- @@ -642,7 +642,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -984,7 +984,7 @@ identityGroupAlias.IdentityGroupAliasConfig( | canonical_id | str | ID of the group to which this is an alias. | | mount_accessor | str | Mount accessor to which this alias belongs to. | | name | str | Name of the group alias. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1069,7 +1069,7 @@ canonical_id: str ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -1083,7 +1083,7 @@ mount_accessor: str Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -1097,7 +1097,7 @@ name: str Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupAlias.typescript.md b/docs/identityGroupAlias.typescript.md index 76077122..36c15698 100644 --- a/docs/identityGroupAlias.typescript.md +++ b/docs/identityGroupAlias.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -810,7 +810,7 @@ const identityGroupAliasConfig: identityGroupAlias.IdentityGroupAliasConfig = { | canonicalId | string | ID of the group to which this is an alias. | | mountAccessor | string | Mount accessor to which this alias belongs to. | | name | string | Name of the group alias. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -895,7 +895,7 @@ public readonly canonicalId: string; ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -909,7 +909,7 @@ public readonly mountAccessor: string; Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -923,7 +923,7 @@ public readonly name: string; Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.csharp.md b/docs/identityGroupMemberEntityIds.csharp.md index 745c7b43..77321969 100644 --- a/docs/identityGroupMemberEntityIds.csharp.md +++ b/docs/identityGroupMemberEntityIds.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -525,7 +525,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| GroupName | string | *No description.* | | ExclusiveInput | object | *No description.* | | GroupIdInput | string | *No description.* | | IdInput | string | *No description.* | @@ -681,16 +680,6 @@ public object[] Provisioners { get; } --- -##### `GroupName`Required - -```csharp -public string GroupName { get; } -``` - -- *Type:* string - ---- - ##### `ExclusiveInput`Optional ```csharp @@ -847,7 +836,7 @@ new IdentityGroupMemberEntityIdsConfig { | Provisioners | object[] | *No description.* | | GroupId | string | ID of the group. | | Exclusive | object | If set to true, allows the resource to manage member entity ids exclusively. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | MemberEntityIds | string[] | Entity IDs to be assigned as group members. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -933,7 +922,7 @@ public string GroupId { get; set; } ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -949,7 +938,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -961,7 +950,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -978,7 +967,7 @@ public string[] MemberEntityIds { get; set; } Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -992,7 +981,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.go.md b/docs/identityGroupMemberEntityIds.go.md index 37d81168..d2f4a3d7 100644 --- a/docs/identityGroupMemberEntityIds.go.md +++ b/docs/identityGroupMemberEntityIds.go.md @@ -4,12 +4,12 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmemberentityids" identitygroupmemberentityids.NewIdentityGroupMemberEntityIds(scope Construct, id *string, config IdentityGroupMemberEntityIdsConfig) IdentityGroupMemberEntityIds ``` @@ -406,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmemberentityids" identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmemberentityids" identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsTerraformElement(x i ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmemberentityids" identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ identitygroupmemberentityids.IdentityGroupMemberEntityIds_IsTerraformResource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmemberentityids" identitygroupmemberentityids.IdentityGroupMemberEntityIds_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -525,7 +525,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| GroupName | *string | *No description.* | | ExclusiveInput | interface{} | *No description.* | | GroupIdInput | *string | *No description.* | | IdInput | *string | *No description.* | @@ -681,16 +680,6 @@ func Provisioners() *[]interface{} --- -##### `GroupName`Required - -```go -func GroupName() *string -``` - -- *Type:* *string - ---- - ##### `ExclusiveInput`Optional ```go @@ -816,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberentityids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmemberentityids" &identitygroupmemberentityids.IdentityGroupMemberEntityIdsConfig { Connection: interface{}, @@ -847,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmemberen | Provisioners | *[]interface{} | *No description.* | | GroupId | *string | ID of the group. | | Exclusive | interface{} | If set to true, allows the resource to manage member entity ids exclusively. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | MemberEntityIds | *[]*string | Entity IDs to be assigned as group members. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -933,7 +922,7 @@ GroupId *string ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -949,7 +938,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -961,7 +950,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -978,7 +967,7 @@ MemberEntityIds *[]*string Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -992,7 +981,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.java.md b/docs/identityGroupMemberEntityIds.java.md index 20e29211..c9abc397 100644 --- a/docs/identityGroupMemberEntityIds.java.md +++ b/docs/identityGroupMemberEntityIds.java.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers @@ -45,7 +45,7 @@ IdentityGroupMemberEntityIds.Builder.create(Construct scope, java.lang.String id | provisioners | java.util.List | *No description.* | | groupId | java.lang.String | ID of the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, allows the resource to manage member entity ids exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | memberEntityIds | java.util.List | Entity IDs to be assigned as group members. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -129,7 +129,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -150,7 +150,7 @@ If you experience problems setting this value it might not be settable. Please t Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- @@ -615,7 +615,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -645,7 +645,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| groupName | java.lang.String | *No description.* | | exclusiveInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | groupIdInput | java.lang.String | *No description.* | | idInput | java.lang.String | *No description.* | @@ -801,16 +800,6 @@ public java.lang.Object getProvisioners(); --- -##### `groupName`Required - -```java -public java.lang.String getGroupName(); -``` - -- *Type:* java.lang.String - ---- - ##### `exclusiveInput`Optional ```java @@ -972,7 +961,7 @@ IdentityGroupMemberEntityIdsConfig.builder() | provisioners | java.util.List | *No description.* | | groupId | java.lang.String | ID of the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, allows the resource to manage member entity ids exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | memberEntityIds | java.util.List | Entity IDs to be assigned as group members. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1058,7 +1047,7 @@ public java.lang.String getGroupId(); ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -1074,7 +1063,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -1086,7 +1075,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1103,7 +1092,7 @@ public java.util.List getMemberEntityIds(); Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -1117,7 +1106,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.python.md b/docs/identityGroupMemberEntityIds.python.md index 285d9a7d..a985130b 100644 --- a/docs/identityGroupMemberEntityIds.python.md +++ b/docs/identityGroupMemberEntityIds.python.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers @@ -42,7 +42,7 @@ identityGroupMemberEntityIds.IdentityGroupMemberEntityIds( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_id | str | ID of the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | If set to true, allows the resource to manage member entity ids exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | member_entity_ids | typing.List[str] | Entity IDs to be assigned as group members. | | namespace | str | Target namespace. (requires Enterprise). | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -126,7 +126,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- @@ -658,7 +658,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -688,7 +688,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| group_name | str | *No description.* | | exclusive_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | group_id_input | str | *No description.* | | id_input | str | *No description.* | @@ -844,16 +843,6 @@ provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, Re --- -##### `group_name`Required - -```python -group_name: str -``` - -- *Type:* str - ---- - ##### `exclusive_input`Optional ```python @@ -1010,7 +999,7 @@ identityGroupMemberEntityIds.IdentityGroupMemberEntityIdsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_id | str | ID of the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | If set to true, allows the resource to manage member entity ids exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | member_entity_ids | typing.List[str] | Entity IDs to be assigned as group members. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1096,7 +1085,7 @@ group_id: str ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -1112,7 +1101,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -1124,7 +1113,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1141,7 +1130,7 @@ member_entity_ids: typing.List[str] Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -1155,7 +1144,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.typescript.md b/docs/identityGroupMemberEntityIds.typescript.md index 4f472572..ba47aae3 100644 --- a/docs/identityGroupMemberEntityIds.typescript.md +++ b/docs/identityGroupMemberEntityIds.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -525,7 +525,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| groupName | string | *No description.* | | exclusiveInput | boolean \| cdktf.IResolvable | *No description.* | | groupIdInput | string | *No description.* | | idInput | string | *No description.* | @@ -681,16 +680,6 @@ public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExe --- -##### `groupName`Required - -```typescript -public readonly groupName: string; -``` - -- *Type:* string - ---- - ##### `exclusiveInput`Optional ```typescript @@ -834,7 +823,7 @@ const identityGroupMemberEntityIdsConfig: identityGroupMemberEntityIds.IdentityG | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | groupId | string | ID of the group. | | exclusive | boolean \| cdktf.IResolvable | If set to true, allows the resource to manage member entity ids exclusively. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | memberEntityIds | string[] | Entity IDs to be assigned as group members. | | namespace | string | Target namespace. (requires Enterprise). | @@ -920,7 +909,7 @@ public readonly groupId: string; ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -936,7 +925,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -948,7 +937,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +954,7 @@ public readonly memberEntityIds: string[]; Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -979,7 +968,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.csharp.md b/docs/identityGroupMemberGroupIds.csharp.md index e272f7ea..36c0b9d5 100644 --- a/docs/identityGroupMemberGroupIds.csharp.md +++ b/docs/identityGroupMemberGroupIds.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new IdentityGroupMemberGroupIdsConfig { | Provisioners | object[] | *No description.* | | GroupId | string | ID of the group. | | Exclusive | object | If set to true, allows the resource to manage member group ids exclusively. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | MemberGroupIds | string[] | Group IDs to be assigned as group members. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -922,7 +922,7 @@ public string GroupId { get; set; } ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -938,7 +938,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -950,7 +950,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -967,7 +967,7 @@ public string[] MemberGroupIds { get; set; } Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -981,7 +981,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.go.md b/docs/identityGroupMemberGroupIds.go.md index 7bc761b1..21e55e94 100644 --- a/docs/identityGroupMemberGroupIds.go.md +++ b/docs/identityGroupMemberGroupIds.go.md @@ -4,12 +4,12 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmembergroupids" identitygroupmembergroupids.NewIdentityGroupMemberGroupIds(scope Construct, id *string, config IdentityGroupMemberGroupIdsConfig) IdentityGroupMemberGroupIds ``` @@ -406,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmembergroupids" identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmembergroupids" identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmembergroupids" identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ identitygroupmembergroupids.IdentityGroupMemberGroupIds_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmembergroupids" identitygroupmembergroupids.IdentityGroupMemberGroupIds_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -805,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergroupids" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmembergroupids" &identitygroupmembergroupids.IdentityGroupMemberGroupIdsConfig { Connection: interface{}, @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygroupmembergr | Provisioners | *[]interface{} | *No description.* | | GroupId | *string | ID of the group. | | Exclusive | interface{} | If set to true, allows the resource to manage member group ids exclusively. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | MemberGroupIds | *[]*string | Group IDs to be assigned as group members. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -922,7 +922,7 @@ GroupId *string ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -938,7 +938,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -950,7 +950,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -967,7 +967,7 @@ MemberGroupIds *[]*string Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -981,7 +981,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.java.md b/docs/identityGroupMemberGroupIds.java.md index edda01f5..3136bb14 100644 --- a/docs/identityGroupMemberGroupIds.java.md +++ b/docs/identityGroupMemberGroupIds.java.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers @@ -45,7 +45,7 @@ IdentityGroupMemberGroupIds.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | groupId | java.lang.String | ID of the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, allows the resource to manage member group ids exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | memberGroupIds | java.util.List | Group IDs to be assigned as group members. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -129,7 +129,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -150,7 +150,7 @@ If you experience problems setting this value it might not be settable. Please t Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- @@ -615,7 +615,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -961,7 +961,7 @@ IdentityGroupMemberGroupIdsConfig.builder() | provisioners | java.util.List | *No description.* | | groupId | java.lang.String | ID of the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, allows the resource to manage member group ids exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | memberGroupIds | java.util.List | Group IDs to be assigned as group members. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1047,7 +1047,7 @@ public java.lang.String getGroupId(); ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -1063,7 +1063,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -1075,7 +1075,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1092,7 +1092,7 @@ public java.util.List getMemberGroupIds(); Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -1106,7 +1106,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.python.md b/docs/identityGroupMemberGroupIds.python.md index 751b7c74..476069ed 100644 --- a/docs/identityGroupMemberGroupIds.python.md +++ b/docs/identityGroupMemberGroupIds.python.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers @@ -42,7 +42,7 @@ identityGroupMemberGroupIds.IdentityGroupMemberGroupIds( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_id | str | ID of the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | If set to true, allows the resource to manage member group ids exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | member_group_ids | typing.List[str] | Group IDs to be assigned as group members. | | namespace | str | Target namespace. (requires Enterprise). | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -126,7 +126,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- @@ -658,7 +658,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -999,7 +999,7 @@ identityGroupMemberGroupIds.IdentityGroupMemberGroupIdsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_id | str | ID of the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | If set to true, allows the resource to manage member group ids exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | member_group_ids | typing.List[str] | Group IDs to be assigned as group members. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1085,7 +1085,7 @@ group_id: str ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -1101,7 +1101,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -1113,7 +1113,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1130,7 +1130,7 @@ member_group_ids: typing.List[str] Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -1144,7 +1144,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.typescript.md b/docs/identityGroupMemberGroupIds.typescript.md index bd42db0f..a63a844f 100644 --- a/docs/identityGroupMemberGroupIds.typescript.md +++ b/docs/identityGroupMemberGroupIds.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const identityGroupMemberGroupIdsConfig: identityGroupMemberGroupIds.IdentityGro | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | groupId | string | ID of the group. | | exclusive | boolean \| cdktf.IResolvable | If set to true, allows the resource to manage member group ids exclusively. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | memberGroupIds | string[] | Group IDs to be assigned as group members. | | namespace | string | Target namespace. (requires Enterprise). | @@ -909,7 +909,7 @@ public readonly groupId: string; ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -925,7 +925,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -937,7 +937,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -954,7 +954,7 @@ public readonly memberGroupIds: string[]; Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -968,7 +968,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupPolicies.csharp.md b/docs/identityGroupPolicies.csharp.md index c7703d4e..df1f6b05 100644 --- a/docs/identityGroupPolicies.csharp.md +++ b/docs/identityGroupPolicies.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -841,7 +841,7 @@ new IdentityGroupPoliciesConfig { | GroupId | string | ID of the group. | | Policies | string[] | Policies to be tied to the group. | | Exclusive | object | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -926,7 +926,7 @@ public string GroupId { get; set; } ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -940,7 +940,7 @@ public string[] Policies { get; set; } Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -954,7 +954,7 @@ public object Exclusive { get; set; } Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -966,7 +966,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityGroupPolicies.go.md b/docs/identityGroupPolicies.go.md index 5a5f50db..9ae70666 100644 --- a/docs/identityGroupPolicies.go.md +++ b/docs/identityGroupPolicies.go.md @@ -4,12 +4,12 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygrouppolicies" identitygrouppolicies.NewIdentityGroupPolicies(scope Construct, id *string, config IdentityGroupPoliciesConfig) IdentityGroupPolicies ``` @@ -399,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygrouppolicies" identitygrouppolicies.IdentityGroupPolicies_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygrouppolicies" identitygrouppolicies.IdentityGroupPolicies_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ identitygrouppolicies.IdentityGroupPolicies_IsTerraformElement(x interface{}) *b ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygrouppolicies" identitygrouppolicies.IdentityGroupPolicies_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ identitygrouppolicies.IdentityGroupPolicies_IsTerraformResource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygrouppolicies" identitygrouppolicies.IdentityGroupPolicies_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -809,7 +809,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygrouppolicies" &identitygrouppolicies.IdentityGroupPoliciesConfig { Connection: interface{}, @@ -841,7 +841,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitygrouppolicies | GroupId | *string | ID of the group. | | Policies | *[]*string | Policies to be tied to the group. | | Exclusive | interface{} | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -926,7 +926,7 @@ GroupId *string ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -940,7 +940,7 @@ Policies *[]*string Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -954,7 +954,7 @@ Exclusive interface{} Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -966,7 +966,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityGroupPolicies.java.md b/docs/identityGroupPolicies.java.md index dde44bdc..374e8887 100644 --- a/docs/identityGroupPolicies.java.md +++ b/docs/identityGroupPolicies.java.md @@ -4,7 +4,7 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers @@ -46,7 +46,7 @@ IdentityGroupPolicies.Builder.create(Construct scope, java.lang.String id) | groupId | java.lang.String | ID of the group. | | policies | java.util.List | Policies to be tied to the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -158,7 +158,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- @@ -606,7 +606,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -964,7 +964,7 @@ IdentityGroupPoliciesConfig.builder() | groupId | java.lang.String | ID of the group. | | policies | java.util.List | Policies to be tied to the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1049,7 +1049,7 @@ public java.lang.String getGroupId(); ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -1063,7 +1063,7 @@ public java.util.List getPolicies(); Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -1077,7 +1077,7 @@ public java.lang.Object getExclusive(); Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -1089,7 +1089,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1106,7 +1106,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityGroupPolicies.python.md b/docs/identityGroupPolicies.python.md index bb891f9a..ad999681 100644 --- a/docs/identityGroupPolicies.python.md +++ b/docs/identityGroupPolicies.python.md @@ -4,7 +4,7 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers @@ -43,7 +43,7 @@ identityGroupPolicies.IdentityGroupPolicies( | group_id | str | ID of the group. | | policies | typing.List[str] | Policies to be tied to the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -1002,7 +1002,7 @@ identityGroupPolicies.IdentityGroupPoliciesConfig( | group_id | str | ID of the group. | | policies | typing.List[str] | Policies to be tied to the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1087,7 +1087,7 @@ group_id: str ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -1101,7 +1101,7 @@ policies: typing.List[str] Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -1115,7 +1115,7 @@ exclusive: typing.Union[bool, IResolvable] Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -1127,7 +1127,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1144,7 +1144,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityGroupPolicies.typescript.md b/docs/identityGroupPolicies.typescript.md index fe0f8452..fa48239d 100644 --- a/docs/identityGroupPolicies.typescript.md +++ b/docs/identityGroupPolicies.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -828,7 +828,7 @@ const identityGroupPoliciesConfig: identityGroupPolicies.IdentityGroupPoliciesCo | groupId | string | ID of the group. | | policies | string[] | Policies to be tied to the group. | | exclusive | boolean \| cdktf.IResolvable | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -913,7 +913,7 @@ public readonly groupId: string; ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -927,7 +927,7 @@ public readonly policies: string[]; Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -941,7 +941,7 @@ public readonly exclusive: boolean | IResolvable; Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -953,7 +953,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -970,7 +970,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityMfaDuo.csharp.md b/docs/identityMfaDuo.csharp.md index b707dd47..2b8fe70f 100644 --- a/docs/identityMfaDuo.csharp.md +++ b/docs/identityMfaDuo.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -990,7 +990,7 @@ new IdentityMfaDuoConfig { | ApiHostname | string | API hostname for Duo. | | IntegrationKey | string | Integration key for Duo. | | SecretKey | string | Secret key for Duo. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | PushInfo | string | Push information for Duo. | | UsePasscode | object | Require passcode upon MFA validation. | @@ -1078,7 +1078,7 @@ public string ApiHostname { get; set; } API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1092,7 +1092,7 @@ public string IntegrationKey { get; set; } Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1106,7 +1106,7 @@ public string SecretKey { get; set; } Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1118,7 +1118,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1135,7 +1135,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1149,7 +1149,7 @@ public string PushInfo { get; set; } Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1163,7 +1163,7 @@ public object UsePasscode { get; set; } Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1177,7 +1177,7 @@ public string UsernameFormat { get; set; } A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaDuo.go.md b/docs/identityMfaDuo.go.md index 6badb3af..4c5eff9f 100644 --- a/docs/identityMfaDuo.go.md +++ b/docs/identityMfaDuo.go.md @@ -4,12 +4,12 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaduo" identitymfaduo.NewIdentityMfaDuo(scope Construct, id *string, config IdentityMfaDuoConfig) IdentityMfaDuo ``` @@ -413,7 +413,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaduo" identitymfaduo.IdentityMfaDuo_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaduo" identitymfaduo.IdentityMfaDuo_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ identitymfaduo.IdentityMfaDuo_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaduo" identitymfaduo.IdentityMfaDuo_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ identitymfaduo.IdentityMfaDuo_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaduo" identitymfaduo.IdentityMfaDuo_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -955,7 +955,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaduo" &identitymfaduo.IdentityMfaDuoConfig { Connection: interface{}, @@ -990,7 +990,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaduo" | ApiHostname | *string | API hostname for Duo. | | IntegrationKey | *string | Integration key for Duo. | | SecretKey | *string | Secret key for Duo. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | PushInfo | *string | Push information for Duo. | | UsePasscode | interface{} | Require passcode upon MFA validation. | @@ -1078,7 +1078,7 @@ ApiHostname *string API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1092,7 +1092,7 @@ IntegrationKey *string Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1106,7 +1106,7 @@ SecretKey *string Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1118,7 +1118,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1135,7 +1135,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1149,7 +1149,7 @@ PushInfo *string Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1163,7 +1163,7 @@ UsePasscode interface{} Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1177,7 +1177,7 @@ UsernameFormat *string A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaDuo.java.md b/docs/identityMfaDuo.java.md index db18e19b..0d065030 100644 --- a/docs/identityMfaDuo.java.md +++ b/docs/identityMfaDuo.java.md @@ -4,7 +4,7 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers @@ -49,7 +49,7 @@ IdentityMfaDuo.Builder.create(Construct scope, java.lang.String id) | apiHostname | java.lang.String | API hostname for Duo. | | integrationKey | java.lang.String | Integration key for Duo. | | secretKey | java.lang.String | Secret key for Duo. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pushInfo | java.lang.String | Push information for Duo. | | usePasscode | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Require passcode upon MFA validation. | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -164,7 +164,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -1149,7 +1149,7 @@ IdentityMfaDuoConfig.builder() | apiHostname | java.lang.String | API hostname for Duo. | | integrationKey | java.lang.String | Integration key for Duo. | | secretKey | java.lang.String | Secret key for Duo. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pushInfo | java.lang.String | Push information for Duo. | | usePasscode | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Require passcode upon MFA validation. | @@ -1237,7 +1237,7 @@ public java.lang.String getApiHostname(); API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1251,7 +1251,7 @@ public java.lang.String getIntegrationKey(); Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1265,7 +1265,7 @@ public java.lang.String getSecretKey(); Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1277,7 +1277,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1294,7 +1294,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1308,7 +1308,7 @@ public java.lang.String getPushInfo(); Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1322,7 +1322,7 @@ public java.lang.Object getUsePasscode(); Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1336,7 +1336,7 @@ public java.lang.String getUsernameFormat(); A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaDuo.python.md b/docs/identityMfaDuo.python.md index 5b568624..6360738a 100644 --- a/docs/identityMfaDuo.python.md +++ b/docs/identityMfaDuo.python.md @@ -4,7 +4,7 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers @@ -46,7 +46,7 @@ identityMfaDuo.IdentityMfaDuo( | api_hostname | str | API hostname for Duo. | | integration_key | str | Integration key for Duo. | | secret_key | str | Secret key for Duo. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | str | Target namespace. (requires Enterprise). | | push_info | str | Push information for Duo. | | use_passcode | typing.Union[bool, cdktf.IResolvable] | Require passcode upon MFA validation. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- @@ -699,7 +699,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -1187,7 +1187,7 @@ identityMfaDuo.IdentityMfaDuoConfig( | api_hostname | str | API hostname for Duo. | | integration_key | str | Integration key for Duo. | | secret_key | str | Secret key for Duo. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | str | Target namespace. (requires Enterprise). | | push_info | str | Push information for Duo. | | use_passcode | typing.Union[bool, cdktf.IResolvable] | Require passcode upon MFA validation. | @@ -1275,7 +1275,7 @@ api_hostname: str API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1289,7 +1289,7 @@ integration_key: str Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1303,7 +1303,7 @@ secret_key: str Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1315,7 +1315,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1332,7 +1332,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1346,7 +1346,7 @@ push_info: str Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1360,7 +1360,7 @@ use_passcode: typing.Union[bool, IResolvable] Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1374,7 +1374,7 @@ username_format: str A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaDuo.typescript.md b/docs/identityMfaDuo.typescript.md index 1dcce22c..68053813 100644 --- a/docs/identityMfaDuo.typescript.md +++ b/docs/identityMfaDuo.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -974,7 +974,7 @@ const identityMfaDuoConfig: identityMfaDuo.IdentityMfaDuoConfig = { ... } | apiHostname | string | API hostname for Duo. | | integrationKey | string | Integration key for Duo. | | secretKey | string | Secret key for Duo. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | string | Target namespace. (requires Enterprise). | | pushInfo | string | Push information for Duo. | | usePasscode | boolean \| cdktf.IResolvable | Require passcode upon MFA validation. | @@ -1062,7 +1062,7 @@ public readonly apiHostname: string; API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1076,7 +1076,7 @@ public readonly integrationKey: string; Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1090,7 +1090,7 @@ public readonly secretKey: string; Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1102,7 +1102,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1119,7 +1119,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1133,7 +1133,7 @@ public readonly pushInfo: string; Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1147,7 +1147,7 @@ public readonly usePasscode: boolean | IResolvable; Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1161,7 +1161,7 @@ public readonly usernameFormat: string; A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaLoginEnforcement.csharp.md b/docs/identityMfaLoginEnforcement.csharp.md index 3a2c4075..4d95d64a 100644 --- a/docs/identityMfaLoginEnforcement.csharp.md +++ b/docs/identityMfaLoginEnforcement.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -954,7 +954,7 @@ new IdentityMfaLoginEnforcementConfig { | Name | string | Login enforcement name. | | AuthMethodAccessors | string[] | Set of auth method accessor IDs. | | AuthMethodTypes | string[] | Set of auth method types. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | IdentityEntityIds | string[] | Set of identity entity IDs. | | IdentityGroupIds | string[] | Set of identity group IDs. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1041,7 +1041,7 @@ public string[] MfaMethodIds { get; set; } Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1055,7 +1055,7 @@ public string Name { get; set; } Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1069,7 +1069,7 @@ public string[] AuthMethodAccessors { get; set; } Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1083,7 +1083,7 @@ public string[] AuthMethodTypes { get; set; } Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1095,7 +1095,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1112,7 +1112,7 @@ public string[] IdentityEntityIds { get; set; } Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1126,7 +1126,7 @@ public string[] IdentityGroupIds { get; set; } Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1140,7 +1140,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaLoginEnforcement.go.md b/docs/identityMfaLoginEnforcement.go.md index d68fb262..8ad10d80 100644 --- a/docs/identityMfaLoginEnforcement.go.md +++ b/docs/identityMfaLoginEnforcement.go.md @@ -4,12 +4,12 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaloginenforcement" identitymfaloginenforcement.NewIdentityMfaLoginEnforcement(scope Construct, id *string, config IdentityMfaLoginEnforcementConfig) IdentityMfaLoginEnforcement ``` @@ -420,7 +420,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaloginenforcement" identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsConstruct(x interface{}) *bool ``` @@ -452,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaloginenforcement" identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +466,7 @@ identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaloginenforcement" identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +480,7 @@ identitymfaloginenforcement.IdentityMfaLoginEnforcement_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaloginenforcement" identitymfaloginenforcement.IdentityMfaLoginEnforcement_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -918,7 +918,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenforcement" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaloginenforcement" &identitymfaloginenforcement.IdentityMfaLoginEnforcementConfig { Connection: interface{}, @@ -954,7 +954,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaloginenfor | Name | *string | Login enforcement name. | | AuthMethodAccessors | *[]*string | Set of auth method accessor IDs. | | AuthMethodTypes | *[]*string | Set of auth method types. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | IdentityEntityIds | *[]*string | Set of identity entity IDs. | | IdentityGroupIds | *[]*string | Set of identity group IDs. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1041,7 +1041,7 @@ MfaMethodIds *[]*string Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1055,7 +1055,7 @@ Name *string Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1069,7 +1069,7 @@ AuthMethodAccessors *[]*string Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1083,7 +1083,7 @@ AuthMethodTypes *[]*string Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1095,7 +1095,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1112,7 +1112,7 @@ IdentityEntityIds *[]*string Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1126,7 +1126,7 @@ IdentityGroupIds *[]*string Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1140,7 +1140,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaLoginEnforcement.java.md b/docs/identityMfaLoginEnforcement.java.md index c65af0d8..35b6f0a0 100644 --- a/docs/identityMfaLoginEnforcement.java.md +++ b/docs/identityMfaLoginEnforcement.java.md @@ -4,7 +4,7 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers @@ -49,7 +49,7 @@ IdentityMfaLoginEnforcement.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Login enforcement name. | | authMethodAccessors | java.util.List | Set of auth method accessor IDs. | | authMethodTypes | java.util.List | Set of auth method types. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identityEntityIds | java.util.List | Set of identity entity IDs. | | identityGroupIds | java.util.List | Set of identity group IDs. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- @@ -662,7 +662,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -1111,7 +1111,7 @@ IdentityMfaLoginEnforcementConfig.builder() | name | java.lang.String | Login enforcement name. | | authMethodAccessors | java.util.List | Set of auth method accessor IDs. | | authMethodTypes | java.util.List | Set of auth method types. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identityEntityIds | java.util.List | Set of identity entity IDs. | | identityGroupIds | java.util.List | Set of identity group IDs. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1198,7 +1198,7 @@ public java.util.List getMfaMethodIds(); Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1212,7 +1212,7 @@ public java.lang.String getName(); Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1226,7 +1226,7 @@ public java.util.List getAuthMethodAccessors(); Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1240,7 +1240,7 @@ public java.util.List getAuthMethodTypes(); Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1252,7 +1252,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1269,7 +1269,7 @@ public java.util.List getIdentityEntityIds(); Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1283,7 +1283,7 @@ public java.util.List getIdentityGroupIds(); Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1297,7 +1297,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaLoginEnforcement.python.md b/docs/identityMfaLoginEnforcement.python.md index 184a94ec..59eb2bfe 100644 --- a/docs/identityMfaLoginEnforcement.python.md +++ b/docs/identityMfaLoginEnforcement.python.md @@ -4,7 +4,7 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers @@ -47,7 +47,7 @@ identityMfaLoginEnforcement.IdentityMfaLoginEnforcement( | name | str | Login enforcement name. | | auth_method_accessors | typing.List[str] | Set of auth method accessor IDs. | | auth_method_types | typing.List[str] | Set of auth method types. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identity_entity_ids | typing.List[str] | Set of identity entity IDs. | | identity_group_ids | typing.List[str] | Set of identity group IDs. | | namespace | str | Target namespace. (requires Enterprise). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- @@ -706,7 +706,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -1151,7 +1151,7 @@ identityMfaLoginEnforcement.IdentityMfaLoginEnforcementConfig( | name | str | Login enforcement name. | | auth_method_accessors | typing.List[str] | Set of auth method accessor IDs. | | auth_method_types | typing.List[str] | Set of auth method types. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identity_entity_ids | typing.List[str] | Set of identity entity IDs. | | identity_group_ids | typing.List[str] | Set of identity group IDs. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1238,7 +1238,7 @@ mfa_method_ids: typing.List[str] Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1252,7 +1252,7 @@ name: str Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1266,7 +1266,7 @@ auth_method_accessors: typing.List[str] Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1280,7 +1280,7 @@ auth_method_types: typing.List[str] Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1292,7 +1292,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1309,7 +1309,7 @@ identity_entity_ids: typing.List[str] Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1323,7 +1323,7 @@ identity_group_ids: typing.List[str] Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1337,7 +1337,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaLoginEnforcement.typescript.md b/docs/identityMfaLoginEnforcement.typescript.md index b3265d6b..259397ca 100644 --- a/docs/identityMfaLoginEnforcement.typescript.md +++ b/docs/identityMfaLoginEnforcement.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -938,7 +938,7 @@ const identityMfaLoginEnforcementConfig: identityMfaLoginEnforcement.IdentityMfa | name | string | Login enforcement name. | | authMethodAccessors | string[] | Set of auth method accessor IDs. | | authMethodTypes | string[] | Set of auth method types. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identityEntityIds | string[] | Set of identity entity IDs. | | identityGroupIds | string[] | Set of identity group IDs. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1025,7 +1025,7 @@ public readonly mfaMethodIds: string[]; Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1039,7 +1039,7 @@ public readonly name: string; Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1053,7 +1053,7 @@ public readonly authMethodAccessors: string[]; Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1067,7 +1067,7 @@ public readonly authMethodTypes: string[]; Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1079,7 +1079,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1096,7 +1096,7 @@ public readonly identityEntityIds: string[]; Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1110,7 +1110,7 @@ public readonly identityGroupIds: string[]; Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1124,7 +1124,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaOkta.csharp.md b/docs/identityMfaOkta.csharp.md index ce10e3c7..620892ca 100644 --- a/docs/identityMfaOkta.csharp.md +++ b/docs/identityMfaOkta.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -967,7 +967,7 @@ new IdentityMfaOktaConfig { | ApiToken | string | Okta API token. | | OrgName | string | Name of the organization to be used in the Okta API. | | BaseUrl | string | The base domain to use for API requests. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | PrimaryEmail | object | Only match the primary email for the account. | | UsernameFormat | string | A template string for mapping Identity names to MFA methods. | @@ -1054,7 +1054,7 @@ public string ApiToken { get; set; } Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1068,7 +1068,7 @@ public string OrgName { get; set; } Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1082,7 +1082,7 @@ public string BaseUrl { get; set; } The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1094,7 +1094,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1111,7 +1111,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1125,7 +1125,7 @@ public object PrimaryEmail { get; set; } Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1139,7 +1139,7 @@ public string UsernameFormat { get; set; } A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaOkta.go.md b/docs/identityMfaOkta.go.md index d77dfda6..74459dd0 100644 --- a/docs/identityMfaOkta.go.md +++ b/docs/identityMfaOkta.go.md @@ -4,12 +4,12 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaokta" identitymfaokta.NewIdentityMfaOkta(scope Construct, id *string, config IdentityMfaOktaConfig) IdentityMfaOkta ``` @@ -413,7 +413,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaokta" identitymfaokta.IdentityMfaOkta_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaokta" identitymfaokta.IdentityMfaOkta_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ identitymfaokta.IdentityMfaOkta_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaokta" identitymfaokta.IdentityMfaOkta_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ identitymfaokta.IdentityMfaOkta_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaokta" identitymfaokta.IdentityMfaOkta_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -933,7 +933,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaokta" &identitymfaokta.IdentityMfaOktaConfig { Connection: interface{}, @@ -967,7 +967,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfaokta" | ApiToken | *string | Okta API token. | | OrgName | *string | Name of the organization to be used in the Okta API. | | BaseUrl | *string | The base domain to use for API requests. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | PrimaryEmail | interface{} | Only match the primary email for the account. | | UsernameFormat | *string | A template string for mapping Identity names to MFA methods. | @@ -1054,7 +1054,7 @@ ApiToken *string Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1068,7 +1068,7 @@ OrgName *string Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1082,7 +1082,7 @@ BaseUrl *string The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1094,7 +1094,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1111,7 +1111,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1125,7 +1125,7 @@ PrimaryEmail interface{} Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1139,7 +1139,7 @@ UsernameFormat *string A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaOkta.java.md b/docs/identityMfaOkta.java.md index 13e5bd0f..73438231 100644 --- a/docs/identityMfaOkta.java.md +++ b/docs/identityMfaOkta.java.md @@ -4,7 +4,7 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers @@ -48,7 +48,7 @@ IdentityMfaOkta.Builder.create(Construct scope, java.lang.String id) | apiToken | java.lang.String | Okta API token. | | orgName | java.lang.String | Name of the organization to be used in the Okta API. | | baseUrl | java.lang.String | The base domain to use for API requests. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | primaryEmail | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only match the primary email for the account. | | usernameFormat | java.lang.String | A template string for mapping Identity names to MFA methods. | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -162,7 +162,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- @@ -644,7 +644,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1114,7 +1114,7 @@ IdentityMfaOktaConfig.builder() | apiToken | java.lang.String | Okta API token. | | orgName | java.lang.String | Name of the organization to be used in the Okta API. | | baseUrl | java.lang.String | The base domain to use for API requests. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | primaryEmail | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only match the primary email for the account. | | usernameFormat | java.lang.String | A template string for mapping Identity names to MFA methods. | @@ -1201,7 +1201,7 @@ public java.lang.String getApiToken(); Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1215,7 +1215,7 @@ public java.lang.String getOrgName(); Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1229,7 +1229,7 @@ public java.lang.String getBaseUrl(); The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1241,7 +1241,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1258,7 +1258,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1272,7 +1272,7 @@ public java.lang.Object getPrimaryEmail(); Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1286,7 +1286,7 @@ public java.lang.String getUsernameFormat(); A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaOkta.python.md b/docs/identityMfaOkta.python.md index 46667e48..9b234c15 100644 --- a/docs/identityMfaOkta.python.md +++ b/docs/identityMfaOkta.python.md @@ -4,7 +4,7 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers @@ -45,7 +45,7 @@ identityMfaOkta.IdentityMfaOkta( | api_token | str | Okta API token. | | org_name | str | Name of the organization to be used in the Okta API. | | base_url | str | The base domain to use for API requests. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | str | Target namespace. (requires Enterprise). | | primary_email | typing.Union[bool, cdktf.IResolvable] | Only match the primary email for the account. | | username_format | str | A template string for mapping Identity names to MFA methods. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- @@ -687,7 +687,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1152,7 +1152,7 @@ identityMfaOkta.IdentityMfaOktaConfig( | api_token | str | Okta API token. | | org_name | str | Name of the organization to be used in the Okta API. | | base_url | str | The base domain to use for API requests. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | str | Target namespace. (requires Enterprise). | | primary_email | typing.Union[bool, cdktf.IResolvable] | Only match the primary email for the account. | | username_format | str | A template string for mapping Identity names to MFA methods. | @@ -1239,7 +1239,7 @@ api_token: str Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1253,7 +1253,7 @@ org_name: str Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1267,7 +1267,7 @@ base_url: str The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1279,7 +1279,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1296,7 +1296,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1310,7 +1310,7 @@ primary_email: typing.Union[bool, IResolvable] Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1324,7 +1324,7 @@ username_format: str A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaOkta.typescript.md b/docs/identityMfaOkta.typescript.md index 5e50259a..c85655e8 100644 --- a/docs/identityMfaOkta.typescript.md +++ b/docs/identityMfaOkta.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -952,7 +952,7 @@ const identityMfaOktaConfig: identityMfaOkta.IdentityMfaOktaConfig = { ... } | apiToken | string | Okta API token. | | orgName | string | Name of the organization to be used in the Okta API. | | baseUrl | string | The base domain to use for API requests. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | string | Target namespace. (requires Enterprise). | | primaryEmail | boolean \| cdktf.IResolvable | Only match the primary email for the account. | | usernameFormat | string | A template string for mapping Identity names to MFA methods. | @@ -1039,7 +1039,7 @@ public readonly apiToken: string; Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1053,7 +1053,7 @@ public readonly orgName: string; Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1067,7 +1067,7 @@ public readonly baseUrl: string; The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1079,7 +1079,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1096,7 +1096,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1110,7 +1110,7 @@ public readonly primaryEmail: boolean | IResolvable; Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1124,7 +1124,7 @@ public readonly usernameFormat: string; A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaPingid.csharp.md b/docs/identityMfaPingid.csharp.md index 255e7a47..2cc00573 100644 --- a/docs/identityMfaPingid.csharp.md +++ b/docs/identityMfaPingid.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -937,7 +937,7 @@ new IdentityMfaPingidConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | SettingsFileBase64 | string | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | UsernameFormat | string | A template string for mapping Identity names to MFA methods. | @@ -1023,7 +1023,7 @@ public string SettingsFileBase64 { get; set; } A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1035,7 +1035,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1052,7 +1052,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1066,7 +1066,7 @@ public string UsernameFormat { get; set; } A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaPingid.go.md b/docs/identityMfaPingid.go.md index 68a4bf44..1809aaa8 100644 --- a/docs/identityMfaPingid.go.md +++ b/docs/identityMfaPingid.go.md @@ -4,12 +4,12 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfapingid" identitymfapingid.NewIdentityMfaPingid(scope Construct, id *string, config IdentityMfaPingidConfig) IdentityMfaPingid ``` @@ -399,7 +399,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfapingid" identitymfapingid.IdentityMfaPingid_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfapingid" identitymfapingid.IdentityMfaPingid_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ identitymfapingid.IdentityMfaPingid_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfapingid" identitymfapingid.IdentityMfaPingid_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ identitymfapingid.IdentityMfaPingid_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfapingid" identitymfapingid.IdentityMfaPingid_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfapingid" &identitymfapingid.IdentityMfaPingidConfig { Connection: interface{}, @@ -937,7 +937,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfapingid" | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | SettingsFileBase64 | *string | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | UsernameFormat | *string | A template string for mapping Identity names to MFA methods. | @@ -1023,7 +1023,7 @@ SettingsFileBase64 *string A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1035,7 +1035,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1052,7 +1052,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1066,7 +1066,7 @@ UsernameFormat *string A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaPingid.java.md b/docs/identityMfaPingid.java.md index d63b0c29..78a46b0a 100644 --- a/docs/identityMfaPingid.java.md +++ b/docs/identityMfaPingid.java.md @@ -4,7 +4,7 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers @@ -42,7 +42,7 @@ IdentityMfaPingid.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | settingsFileBase64 | java.lang.String | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | usernameFormat | java.lang.String | A template string for mapping Identity names to MFA methods. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -135,7 +135,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- @@ -593,7 +593,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1046,7 +1046,7 @@ IdentityMfaPingidConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | settingsFileBase64 | java.lang.String | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | usernameFormat | java.lang.String | A template string for mapping Identity names to MFA methods. | @@ -1132,7 +1132,7 @@ public java.lang.String getSettingsFileBase64(); A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1144,7 +1144,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1161,7 +1161,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1175,7 +1175,7 @@ public java.lang.String getUsernameFormat(); A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaPingid.python.md b/docs/identityMfaPingid.python.md index b5e6433c..b02d5f5f 100644 --- a/docs/identityMfaPingid.python.md +++ b/docs/identityMfaPingid.python.md @@ -4,7 +4,7 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers @@ -40,7 +40,7 @@ identityMfaPingid.IdentityMfaPingid( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | settings_file_base64 | str | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | str | Target namespace. (requires Enterprise). | | username_format | str | A template string for mapping Identity names to MFA methods. | @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- @@ -637,7 +637,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1086,7 +1086,7 @@ identityMfaPingid.IdentityMfaPingidConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | settings_file_base64 | str | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | str | Target namespace. (requires Enterprise). | | username_format | str | A template string for mapping Identity names to MFA methods. | @@ -1172,7 +1172,7 @@ settings_file_base64: str A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1184,7 +1184,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1201,7 +1201,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1215,7 +1215,7 @@ username_format: str A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaPingid.typescript.md b/docs/identityMfaPingid.typescript.md index 1c748e58..1d39328a 100644 --- a/docs/identityMfaPingid.typescript.md +++ b/docs/identityMfaPingid.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -925,7 +925,7 @@ const identityMfaPingidConfig: identityMfaPingid.IdentityMfaPingidConfig = { ... | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | settingsFileBase64 | string | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | string | Target namespace. (requires Enterprise). | | usernameFormat | string | A template string for mapping Identity names to MFA methods. | @@ -1011,7 +1011,7 @@ public readonly settingsFileBase64: string; A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1023,7 +1023,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1040,7 +1040,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1054,7 +1054,7 @@ public readonly usernameFormat: string; A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaTotp.csharp.md b/docs/identityMfaTotp.csharp.md index c8c5eeff..8df3e2b2 100644 --- a/docs/identityMfaTotp.csharp.md +++ b/docs/identityMfaTotp.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1064,7 +1064,7 @@ new IdentityMfaTotpConfig { | Issuer | string | The name of the key's issuing organization. | | Algorithm | string | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | Digits | double | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | KeySize | double | Specifies the size in bytes of the generated key. | | MaxValidationAttempts | double | The maximum number of consecutive failed validation attempts allowed. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1154,7 +1154,7 @@ public string Issuer { get; set; } The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1168,7 +1168,7 @@ public string Algorithm { get; set; } Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1182,7 +1182,7 @@ public double Digits { get; set; } The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1194,7 +1194,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1211,7 +1211,7 @@ public double KeySize { get; set; } Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1225,7 +1225,7 @@ public double MaxValidationAttempts { get; set; } The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1239,7 +1239,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1253,7 +1253,7 @@ public double Period { get; set; } The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1267,7 +1267,7 @@ public double QrSize { get; set; } The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1283,7 +1283,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityMfaTotp.go.md b/docs/identityMfaTotp.go.md index 4ef54e90..0aa9281d 100644 --- a/docs/identityMfaTotp.go.md +++ b/docs/identityMfaTotp.go.md @@ -4,12 +4,12 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfatotp" identitymfatotp.NewIdentityMfaTotp(scope Construct, id *string, config IdentityMfaTotpConfig) IdentityMfaTotp ``` @@ -441,7 +441,7 @@ func ResetSkew() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfatotp" identitymfatotp.IdentityMfaTotp_IsConstruct(x interface{}) *bool ``` @@ -473,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfatotp" identitymfatotp.IdentityMfaTotp_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +487,7 @@ identitymfatotp.IdentityMfaTotp_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfatotp" identitymfatotp.IdentityMfaTotp_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +501,7 @@ identitymfatotp.IdentityMfaTotp_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfatotp" identitymfatotp.IdentityMfaTotp_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -530,7 +530,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1027,7 +1027,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfatotp" &identitymfatotp.IdentityMfaTotpConfig { Connection: interface{}, @@ -1064,7 +1064,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identitymfatotp" | Issuer | *string | The name of the key's issuing organization. | | Algorithm | *string | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | Digits | *f64 | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | KeySize | *f64 | Specifies the size in bytes of the generated key. | | MaxValidationAttempts | *f64 | The maximum number of consecutive failed validation attempts allowed. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1154,7 +1154,7 @@ Issuer *string The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1168,7 +1168,7 @@ Algorithm *string Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1182,7 +1182,7 @@ Digits *f64 The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1194,7 +1194,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1211,7 +1211,7 @@ KeySize *f64 Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1225,7 +1225,7 @@ MaxValidationAttempts *f64 The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1239,7 +1239,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1253,7 +1253,7 @@ Period *f64 The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1267,7 +1267,7 @@ QrSize *f64 The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1283,7 +1283,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityMfaTotp.java.md b/docs/identityMfaTotp.java.md index f29d5d38..a7b1a5d2 100644 --- a/docs/identityMfaTotp.java.md +++ b/docs/identityMfaTotp.java.md @@ -4,7 +4,7 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers @@ -50,7 +50,7 @@ IdentityMfaTotp.Builder.create(Construct scope, java.lang.String id) | issuer | java.lang.String | The name of the key's issuing organization. | | algorithm | java.lang.String | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | java.lang.Number | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | keySize | java.lang.Number | Specifies the size in bytes of the generated key. | | maxValidationAttempts | java.lang.Number | The maximum number of consecutive failed validation attempts allowed. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -219,7 +219,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- @@ -709,7 +709,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1247,7 +1247,7 @@ IdentityMfaTotpConfig.builder() | issuer | java.lang.String | The name of the key's issuing organization. | | algorithm | java.lang.String | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | java.lang.Number | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | keySize | java.lang.Number | Specifies the size in bytes of the generated key. | | maxValidationAttempts | java.lang.Number | The maximum number of consecutive failed validation attempts allowed. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1337,7 +1337,7 @@ public java.lang.String getIssuer(); The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1351,7 +1351,7 @@ public java.lang.String getAlgorithm(); Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1365,7 +1365,7 @@ public java.lang.Number getDigits(); The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1377,7 +1377,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1394,7 +1394,7 @@ public java.lang.Number getKeySize(); Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1408,7 +1408,7 @@ public java.lang.Number getMaxValidationAttempts(); The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1422,7 +1422,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1436,7 +1436,7 @@ public java.lang.Number getPeriod(); The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1450,7 +1450,7 @@ public java.lang.Number getQrSize(); The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1466,7 +1466,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityMfaTotp.python.md b/docs/identityMfaTotp.python.md index f45ceb5e..dafe63c2 100644 --- a/docs/identityMfaTotp.python.md +++ b/docs/identityMfaTotp.python.md @@ -4,7 +4,7 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers @@ -48,7 +48,7 @@ identityMfaTotp.IdentityMfaTotp( | issuer | str | The name of the key's issuing organization. | | algorithm | str | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | typing.Union[int, float] | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | key_size | typing.Union[int, float] | Specifies the size in bytes of the generated key. | | max_validation_attempts | typing.Union[int, float] | The maximum number of consecutive failed validation attempts allowed. | | namespace | str | Target namespace. (requires Enterprise). | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -165,7 +165,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -217,7 +217,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- @@ -753,7 +753,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1287,7 +1287,7 @@ identityMfaTotp.IdentityMfaTotpConfig( | issuer | str | The name of the key's issuing organization. | | algorithm | str | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | typing.Union[int, float] | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | key_size | typing.Union[int, float] | Specifies the size in bytes of the generated key. | | max_validation_attempts | typing.Union[int, float] | The maximum number of consecutive failed validation attempts allowed. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1377,7 +1377,7 @@ issuer: str The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1391,7 +1391,7 @@ algorithm: str Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1405,7 +1405,7 @@ digits: typing.Union[int, float] The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1417,7 +1417,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1434,7 +1434,7 @@ key_size: typing.Union[int, float] Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1448,7 +1448,7 @@ max_validation_attempts: typing.Union[int, float] The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1462,7 +1462,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1476,7 +1476,7 @@ period: typing.Union[int, float] The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1490,7 +1490,7 @@ qr_size: typing.Union[int, float] The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1506,7 +1506,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityMfaTotp.typescript.md b/docs/identityMfaTotp.typescript.md index 1f05ba53..c12ebb85 100644 --- a/docs/identityMfaTotp.typescript.md +++ b/docs/identityMfaTotp.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1046,7 +1046,7 @@ const identityMfaTotpConfig: identityMfaTotp.IdentityMfaTotpConfig = { ... } | issuer | string | The name of the key's issuing organization. | | algorithm | string | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | number | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | keySize | number | Specifies the size in bytes of the generated key. | | maxValidationAttempts | number | The maximum number of consecutive failed validation attempts allowed. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1136,7 +1136,7 @@ public readonly issuer: string; The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1150,7 +1150,7 @@ public readonly algorithm: string; Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1164,7 +1164,7 @@ public readonly digits: number; The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1176,7 +1176,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1193,7 +1193,7 @@ public readonly keySize: number; Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1207,7 +1207,7 @@ public readonly maxValidationAttempts: number; The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1221,7 +1221,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1235,7 +1235,7 @@ public readonly period: number; The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1249,7 +1249,7 @@ public readonly qrSize: number; The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1265,7 +1265,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityOidc.csharp.md b/docs/identityOidc.csharp.md index 0e12a2c0..c063b403 100644 --- a/docs/identityOidc.csharp.md +++ b/docs/identityOidc.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -781,7 +781,7 @@ new IdentityOidcConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | Issuer | string | Issuer URL to be used in the iss claim of the token. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -865,7 +865,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -884,7 +884,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -898,7 +898,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidc.go.md b/docs/identityOidc.go.md index 7991c847..6fc77bc9 100644 --- a/docs/identityOidc.go.md +++ b/docs/identityOidc.go.md @@ -4,12 +4,12 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidc" identityoidc.NewIdentityOidc(scope Construct, id *string, config IdentityOidcConfig) IdentityOidc ``` @@ -399,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidc" identityoidc.IdentityOidc_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidc" identityoidc.IdentityOidc_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ identityoidc.IdentityOidc_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidc" identityoidc.IdentityOidc_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ identityoidc.IdentityOidc_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidc" identityoidc.IdentityOidc_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -754,7 +754,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidc" &identityoidc.IdentityOidcConfig { Connection: interface{}, @@ -781,7 +781,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidc" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | Issuer | *string | Issuer URL to be used in the iss claim of the token. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -865,7 +865,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -884,7 +884,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -898,7 +898,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidc.java.md b/docs/identityOidc.java.md index 55bd1389..bbe5b3ef 100644 --- a/docs/identityOidc.java.md +++ b/docs/identityOidc.java.md @@ -4,7 +4,7 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers @@ -40,7 +40,7 @@ IdentityOidc.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | java.lang.String | Issuer URL to be used in the iss claim of the token. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -125,7 +125,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- @@ -583,7 +583,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -880,7 +880,7 @@ IdentityOidcConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | java.lang.String | Issuer URL to be used in the iss claim of the token. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -964,7 +964,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -997,7 +997,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidc.python.md b/docs/identityOidc.python.md index a22b9732..051187cb 100644 --- a/docs/identityOidc.python.md +++ b/docs/identityOidc.python.md @@ -4,7 +4,7 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers @@ -38,7 +38,7 @@ identityOidc.IdentityOidc( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | str | Issuer URL to be used in the iss claim of the token. | | namespace | str | Target namespace. (requires Enterprise). | @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -123,7 +123,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- @@ -627,7 +627,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -920,7 +920,7 @@ identityOidc.IdentityOidcConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | str | Issuer URL to be used in the iss claim of the token. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1004,7 +1004,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1023,7 +1023,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -1037,7 +1037,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidc.typescript.md b/docs/identityOidc.typescript.md index dc4b1498..7706a61a 100644 --- a/docs/identityOidc.typescript.md +++ b/docs/identityOidc.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -770,7 +770,7 @@ const identityOidcConfig: identityOidc.IdentityOidcConfig = { ... } | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | string | Issuer URL to be used in the iss claim of the token. | | namespace | string | Target namespace. (requires Enterprise). | @@ -854,7 +854,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -873,7 +873,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -887,7 +887,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidcAssignment.csharp.md b/docs/identityOidcAssignment.csharp.md index 1198d0e4..17aae82a 100644 --- a/docs/identityOidcAssignment.csharp.md +++ b/docs/identityOidcAssignment.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -837,7 +837,7 @@ new IdentityOidcAssignmentConfig { | Name | string | The name of the assignment. | | EntityIds | string[] | A list of Vault entity IDs. | | GroupIds | string[] | A list of Vault group IDs. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -922,7 +922,7 @@ public string Name { get; set; } The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -936,7 +936,7 @@ public string[] EntityIds { get; set; } A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -950,7 +950,7 @@ public string[] GroupIds { get; set; } A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -962,7 +962,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -979,7 +979,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcAssignment.go.md b/docs/identityOidcAssignment.go.md index dc454ed4..b6862280 100644 --- a/docs/identityOidcAssignment.go.md +++ b/docs/identityOidcAssignment.go.md @@ -4,12 +4,12 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcassignment" identityoidcassignment.NewIdentityOidcAssignment(scope Construct, id *string, config IdentityOidcAssignmentConfig) IdentityOidcAssignment ``` @@ -406,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcassignment" identityoidcassignment.IdentityOidcAssignment_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcassignment" identityoidcassignment.IdentityOidcAssignment_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ identityoidcassignment.IdentityOidcAssignment_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcassignment" identityoidcassignment.IdentityOidcAssignment_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ identityoidcassignment.IdentityOidcAssignment_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcassignment" identityoidcassignment.IdentityOidcAssignment_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -805,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignment" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcassignment" &identityoidcassignment.IdentityOidcAssignmentConfig { Connection: interface{}, @@ -837,7 +837,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcassignmen | Name | *string | The name of the assignment. | | EntityIds | *[]*string | A list of Vault entity IDs. | | GroupIds | *[]*string | A list of Vault group IDs. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -922,7 +922,7 @@ Name *string The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -936,7 +936,7 @@ EntityIds *[]*string A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -950,7 +950,7 @@ GroupIds *[]*string A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -962,7 +962,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -979,7 +979,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcAssignment.java.md b/docs/identityOidcAssignment.java.md index 4b8776b4..56e18394 100644 --- a/docs/identityOidcAssignment.java.md +++ b/docs/identityOidcAssignment.java.md @@ -4,7 +4,7 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers @@ -45,7 +45,7 @@ IdentityOidcAssignment.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the assignment. | | entityIds | java.util.List | A list of Vault entity IDs. | | groupIds | java.util.List | A list of Vault group IDs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -958,7 +958,7 @@ IdentityOidcAssignmentConfig.builder() | name | java.lang.String | The name of the assignment. | | entityIds | java.util.List | A list of Vault entity IDs. | | groupIds | java.util.List | A list of Vault group IDs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1043,7 +1043,7 @@ public java.lang.String getName(); The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -1057,7 +1057,7 @@ public java.util.List getEntityIds(); A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -1071,7 +1071,7 @@ public java.util.List getGroupIds(); A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -1083,7 +1083,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1100,7 +1100,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcAssignment.python.md b/docs/identityOidcAssignment.python.md index e449c040..ba7af9c9 100644 --- a/docs/identityOidcAssignment.python.md +++ b/docs/identityOidcAssignment.python.md @@ -4,7 +4,7 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers @@ -43,7 +43,7 @@ identityOidcAssignment.IdentityOidcAssignment( | name | str | The name of the assignment. | | entity_ids | typing.List[str] | A list of Vault entity IDs. | | group_ids | typing.List[str] | A list of Vault group IDs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -998,7 +998,7 @@ identityOidcAssignment.IdentityOidcAssignmentConfig( | name | str | The name of the assignment. | | entity_ids | typing.List[str] | A list of Vault entity IDs. | | group_ids | typing.List[str] | A list of Vault group IDs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1083,7 +1083,7 @@ name: str The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -1097,7 +1097,7 @@ entity_ids: typing.List[str] A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -1111,7 +1111,7 @@ group_ids: typing.List[str] A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -1123,7 +1123,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1140,7 +1140,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcAssignment.typescript.md b/docs/identityOidcAssignment.typescript.md index e4ea7f1a..286f078b 100644 --- a/docs/identityOidcAssignment.typescript.md +++ b/docs/identityOidcAssignment.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -824,7 +824,7 @@ const identityOidcAssignmentConfig: identityOidcAssignment.IdentityOidcAssignmen | name | string | The name of the assignment. | | entityIds | string[] | A list of Vault entity IDs. | | groupIds | string[] | A list of Vault group IDs. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -909,7 +909,7 @@ public readonly name: string; The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -923,7 +923,7 @@ public readonly entityIds: string[]; A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -937,7 +937,7 @@ public readonly groupIds: string[]; A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -949,7 +949,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -966,7 +966,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcClient.csharp.md b/docs/identityOidcClient.csharp.md index 8dd60b75..ef23e002 100644 --- a/docs/identityOidcClient.csharp.md +++ b/docs/identityOidcClient.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ new IdentityOidcClientConfig { | AccessTokenTtl | double | The time-to-live for access tokens obtained by the client. | | Assignments | string[] | A list of assignment resources associated with the client. | | ClientType | string | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | IdTokenTtl | double | The time-to-live for ID tokens obtained by the client. | | Key | string | A reference to a named key resource in Vault. This cannot be modified after creation. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1068,7 +1068,7 @@ public string Name { get; set; } The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1082,7 +1082,7 @@ public double AccessTokenTtl { get; set; } The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1096,7 +1096,7 @@ public string[] Assignments { get; set; } A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1110,7 +1110,7 @@ public string ClientType { get; set; } The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1122,7 +1122,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1141,7 +1141,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1155,7 +1155,7 @@ public string Key { get; set; } A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1169,7 +1169,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1185,7 +1185,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcClient.go.md b/docs/identityOidcClient.go.md index 211017c4..538628cf 100644 --- a/docs/identityOidcClient.go.md +++ b/docs/identityOidcClient.go.md @@ -4,12 +4,12 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcclient" identityoidcclient.NewIdentityOidcClient(scope Construct, id *string, config IdentityOidcClientConfig) IdentityOidcClient ``` @@ -434,7 +434,7 @@ func ResetRedirectUris() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcclient" identityoidcclient.IdentityOidcClient_IsConstruct(x interface{}) *bool ``` @@ -466,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcclient" identityoidcclient.IdentityOidcClient_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +480,7 @@ identityoidcclient.IdentityOidcClient_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcclient" identityoidcclient.IdentityOidcClient_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +494,7 @@ identityoidcclient.IdentityOidcClient_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcclient" identityoidcclient.IdentityOidcClient_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -523,7 +523,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -943,7 +943,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcclient" &identityoidcclient.IdentityOidcClientConfig { Connection: interface{}, @@ -980,7 +980,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcclient" | AccessTokenTtl | *f64 | The time-to-live for access tokens obtained by the client. | | Assignments | *[]*string | A list of assignment resources associated with the client. | | ClientType | *string | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | IdTokenTtl | *f64 | The time-to-live for ID tokens obtained by the client. | | Key | *string | A reference to a named key resource in Vault. This cannot be modified after creation. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1068,7 +1068,7 @@ Name *string The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1082,7 +1082,7 @@ AccessTokenTtl *f64 The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1096,7 +1096,7 @@ Assignments *[]*string A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1110,7 +1110,7 @@ ClientType *string The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1122,7 +1122,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1141,7 +1141,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1155,7 +1155,7 @@ Key *string A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1169,7 +1169,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1185,7 +1185,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcClient.java.md b/docs/identityOidcClient.java.md index baf66dce..e76f7065 100644 --- a/docs/identityOidcClient.java.md +++ b/docs/identityOidcClient.java.md @@ -4,7 +4,7 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers @@ -50,7 +50,7 @@ IdentityOidcClient.Builder.create(Construct scope, java.lang.String id) | accessTokenTtl | java.lang.Number | The time-to-live for access tokens obtained by the client. | | assignments | java.util.List | A list of assignment resources associated with the client. | | clientType | java.lang.String | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | idTokenTtl | java.lang.Number | The time-to-live for ID tokens obtained by the client. | | key | java.lang.String | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +177,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -209,7 +209,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- @@ -692,7 +692,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -1153,7 +1153,7 @@ IdentityOidcClientConfig.builder() | accessTokenTtl | java.lang.Number | The time-to-live for access tokens obtained by the client. | | assignments | java.util.List | A list of assignment resources associated with the client. | | clientType | java.lang.String | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | idTokenTtl | java.lang.Number | The time-to-live for ID tokens obtained by the client. | | key | java.lang.String | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1241,7 +1241,7 @@ public java.lang.String getName(); The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1255,7 +1255,7 @@ public java.lang.Number getAccessTokenTtl(); The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1269,7 +1269,7 @@ public java.util.List getAssignments(); A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1283,7 +1283,7 @@ public java.lang.String getClientType(); The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1295,7 +1295,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1314,7 +1314,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1328,7 +1328,7 @@ public java.lang.String getKey(); A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1342,7 +1342,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1358,7 +1358,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcClient.python.md b/docs/identityOidcClient.python.md index 0bacc82d..ddf541f0 100644 --- a/docs/identityOidcClient.python.md +++ b/docs/identityOidcClient.python.md @@ -4,7 +4,7 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers @@ -48,7 +48,7 @@ identityOidcClient.IdentityOidcClient( | access_token_ttl | typing.Union[int, float] | The time-to-live for access tokens obtained by the client. | | assignments | typing.List[str] | A list of assignment resources associated with the client. | | client_type | str | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | id_token_ttl | typing.Union[int, float] | The time-to-live for ID tokens obtained by the client. | | key | str | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | str | Target namespace. (requires Enterprise). | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -175,7 +175,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -207,7 +207,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- @@ -736,7 +736,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -1193,7 +1193,7 @@ identityOidcClient.IdentityOidcClientConfig( | access_token_ttl | typing.Union[int, float] | The time-to-live for access tokens obtained by the client. | | assignments | typing.List[str] | A list of assignment resources associated with the client. | | client_type | str | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | id_token_ttl | typing.Union[int, float] | The time-to-live for ID tokens obtained by the client. | | key | str | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1281,7 +1281,7 @@ name: str The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1295,7 +1295,7 @@ access_token_ttl: typing.Union[int, float] The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1309,7 +1309,7 @@ assignments: typing.List[str] A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1323,7 +1323,7 @@ client_type: str The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1335,7 +1335,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1354,7 +1354,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1368,7 +1368,7 @@ key: str A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1382,7 +1382,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1398,7 +1398,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcClient.typescript.md b/docs/identityOidcClient.typescript.md index b683b6ca..c5f926aa 100644 --- a/docs/identityOidcClient.typescript.md +++ b/docs/identityOidcClient.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -963,7 +963,7 @@ const identityOidcClientConfig: identityOidcClient.IdentityOidcClientConfig = { | accessTokenTtl | number | The time-to-live for access tokens obtained by the client. | | assignments | string[] | A list of assignment resources associated with the client. | | clientType | string | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | idTokenTtl | number | The time-to-live for ID tokens obtained by the client. | | key | string | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1051,7 +1051,7 @@ public readonly name: string; The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1065,7 +1065,7 @@ public readonly accessTokenTtl: number; The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1079,7 +1079,7 @@ public readonly assignments: string[]; A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1093,7 +1093,7 @@ public readonly clientType: string; The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1105,7 +1105,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1124,7 +1124,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1138,7 +1138,7 @@ public readonly key: string; A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1152,7 +1152,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1168,7 +1168,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcKey.csharp.md b/docs/identityOidcKey.csharp.md index 36efd281..b4503292 100644 --- a/docs/identityOidcKey.csharp.md +++ b/docs/identityOidcKey.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -897,7 +897,7 @@ new IdentityOidcKeyConfig { | Name | string | Name of the key. | | Algorithm | string | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | AllowedClientIds | string[] | Array of role client ids allowed to use this key for signing. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | RotationPeriod | double | How often to generate a new signing key in number of seconds. | | VerificationTtl | double | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -984,7 +984,7 @@ public string Name { get; set; } Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -998,7 +998,7 @@ public string Algorithm { get; set; } Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -1014,7 +1014,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1026,7 +1026,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1043,7 +1043,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1057,7 +1057,7 @@ public double RotationPeriod { get; set; } How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1071,7 +1071,7 @@ public double VerificationTtl { get; set; } Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKey.go.md b/docs/identityOidcKey.go.md index 865c8731..4ba47a3f 100644 --- a/docs/identityOidcKey.go.md +++ b/docs/identityOidcKey.go.md @@ -4,12 +4,12 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckey" identityoidckey.NewIdentityOidcKey(scope Construct, id *string, config IdentityOidcKeyConfig) IdentityOidcKey ``` @@ -420,7 +420,7 @@ func ResetVerificationTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckey" identityoidckey.IdentityOidcKey_IsConstruct(x interface{}) *bool ``` @@ -452,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckey" identityoidckey.IdentityOidcKey_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +466,7 @@ identityoidckey.IdentityOidcKey_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckey" identityoidckey.IdentityOidcKey_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +480,7 @@ identityoidckey.IdentityOidcKey_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckey" identityoidckey.IdentityOidcKey_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -863,7 +863,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckey" &identityoidckey.IdentityOidcKeyConfig { Connection: interface{}, @@ -897,7 +897,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckey" | Name | *string | Name of the key. | | Algorithm | *string | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | AllowedClientIds | *[]*string | Array of role client ids allowed to use this key for signing. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | RotationPeriod | *f64 | How often to generate a new signing key in number of seconds. | | VerificationTtl | *f64 | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -984,7 +984,7 @@ Name *string Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -998,7 +998,7 @@ Algorithm *string Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -1014,7 +1014,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1026,7 +1026,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1043,7 +1043,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1057,7 +1057,7 @@ RotationPeriod *f64 How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1071,7 +1071,7 @@ VerificationTtl *f64 Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKey.java.md b/docs/identityOidcKey.java.md index 029e7f6d..6ea135f5 100644 --- a/docs/identityOidcKey.java.md +++ b/docs/identityOidcKey.java.md @@ -4,7 +4,7 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers @@ -47,7 +47,7 @@ IdentityOidcKey.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Name of the key. | | algorithm | java.lang.String | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowedClientIds | java.util.List | Array of role client ids allowed to use this key for signing. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rotationPeriod | java.lang.Number | How often to generate a new signing key in number of seconds. | | verificationTtl | java.lang.Number | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -142,7 +142,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- @@ -652,7 +652,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -1044,7 +1044,7 @@ IdentityOidcKeyConfig.builder() | name | java.lang.String | Name of the key. | | algorithm | java.lang.String | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowedClientIds | java.util.List | Array of role client ids allowed to use this key for signing. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rotationPeriod | java.lang.Number | How often to generate a new signing key in number of seconds. | | verificationTtl | java.lang.Number | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -1131,7 +1131,7 @@ public java.lang.String getName(); Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -1145,7 +1145,7 @@ public java.lang.String getAlgorithm(); Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -1161,7 +1161,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1173,7 +1173,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1190,7 +1190,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1204,7 +1204,7 @@ public java.lang.Number getRotationPeriod(); How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1218,7 +1218,7 @@ public java.lang.Number getVerificationTtl(); Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKey.python.md b/docs/identityOidcKey.python.md index db282682..24ebccb0 100644 --- a/docs/identityOidcKey.python.md +++ b/docs/identityOidcKey.python.md @@ -4,7 +4,7 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers @@ -45,7 +45,7 @@ identityOidcKey.IdentityOidcKey( | name | str | Name of the key. | | algorithm | str | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowed_client_ids | typing.List[str] | Array of role client ids allowed to use this key for signing. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rotation_period | typing.Union[int, float] | How often to generate a new signing key in number of seconds. | | verification_ttl | typing.Union[int, float] | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -140,7 +140,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- @@ -696,7 +696,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -1084,7 +1084,7 @@ identityOidcKey.IdentityOidcKeyConfig( | name | str | Name of the key. | | algorithm | str | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowed_client_ids | typing.List[str] | Array of role client ids allowed to use this key for signing. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rotation_period | typing.Union[int, float] | How often to generate a new signing key in number of seconds. | | verification_ttl | typing.Union[int, float] | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -1171,7 +1171,7 @@ name: str Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -1185,7 +1185,7 @@ algorithm: str Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -1201,7 +1201,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1213,7 +1213,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1230,7 +1230,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1244,7 +1244,7 @@ rotation_period: typing.Union[int, float] How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1258,7 +1258,7 @@ verification_ttl: typing.Union[int, float] Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKey.typescript.md b/docs/identityOidcKey.typescript.md index c773eea4..b74b7c40 100644 --- a/docs/identityOidcKey.typescript.md +++ b/docs/identityOidcKey.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -882,7 +882,7 @@ const identityOidcKeyConfig: identityOidcKey.IdentityOidcKeyConfig = { ... } | name | string | Name of the key. | | algorithm | string | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowedClientIds | string[] | Array of role client ids allowed to use this key for signing. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | string | Target namespace. (requires Enterprise). | | rotationPeriod | number | How often to generate a new signing key in number of seconds. | | verificationTtl | number | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -969,7 +969,7 @@ public readonly name: string; Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -983,7 +983,7 @@ public readonly algorithm: string; Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -999,7 +999,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1011,7 +1011,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1042,7 +1042,7 @@ public readonly rotationPeriod: number; How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1056,7 +1056,7 @@ public readonly verificationTtl: number; Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKeyAllowedClientId.csharp.md b/docs/identityOidcKeyAllowedClientId.csharp.md index 4369d89d..2f118036 100644 --- a/docs/identityOidcKeyAllowedClientId.csharp.md +++ b/docs/identityOidcKeyAllowedClientId.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ new IdentityOidcKeyAllowedClientIdConfig { | Provisioners | object[] | *No description.* | | AllowedClientId | string | Role Client ID allowed to use the key for signing. | | KeyName | string | Name of the key. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ public string AllowedClientId { get; set; } Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -898,7 +898,7 @@ public string KeyName { get; set; } Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -910,7 +910,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcKeyAllowedClientId.go.md b/docs/identityOidcKeyAllowedClientId.go.md index 7618f51f..fd98c2be 100644 --- a/docs/identityOidcKeyAllowedClientId.go.md +++ b/docs/identityOidcKeyAllowedClientId.go.md @@ -4,12 +4,12 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckeyallowedclientid" identityoidckeyallowedclientid.NewIdentityOidcKeyAllowedClientId(scope Construct, id *string, config IdentityOidcKeyAllowedClientIdConfig) IdentityOidcKeyAllowedClientId ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckeyallowedclientid" identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckeyallowedclientid" identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsTerraformElement ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckeyallowedclientid" identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_IsTerraformResourc ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckeyallowedclientid" identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientId_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowedclientid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckeyallowedclientid" &identityoidckeyallowedclientid.IdentityOidcKeyAllowedClientIdConfig { Connection: interface{}, @@ -799,7 +799,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidckeyallowe | Provisioners | *[]interface{} | *No description.* | | AllowedClientId | *string | Role Client ID allowed to use the key for signing. | | KeyName | *string | Name of the key. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ AllowedClientId *string Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -898,7 +898,7 @@ KeyName *string Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -910,7 +910,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcKeyAllowedClientId.java.md b/docs/identityOidcKeyAllowedClientId.java.md index ab031699..8ad73e1f 100644 --- a/docs/identityOidcKeyAllowedClientId.java.md +++ b/docs/identityOidcKeyAllowedClientId.java.md @@ -4,7 +4,7 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers @@ -43,7 +43,7 @@ IdentityOidcKeyAllowedClientId.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | allowedClientId | java.lang.String | Role Client ID allowed to use the key for signing. | | keyName | java.lang.String | Name of the key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ IdentityOidcKeyAllowedClientIdConfig.builder() | provisioners | java.util.List | *No description.* | | allowedClientId | java.lang.String | Role Client ID allowed to use the key for signing. | | keyName | java.lang.String | Name of the key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ public java.lang.String getAllowedClientId(); Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -1007,7 +1007,7 @@ public java.lang.String getKeyName(); Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -1019,7 +1019,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcKeyAllowedClientId.python.md b/docs/identityOidcKeyAllowedClientId.python.md index fdd6b466..5322475e 100644 --- a/docs/identityOidcKeyAllowedClientId.python.md +++ b/docs/identityOidcKeyAllowedClientId.python.md @@ -4,7 +4,7 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers @@ -41,7 +41,7 @@ identityOidcKeyAllowedClientId.IdentityOidcKeyAllowedClientId( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | allowed_client_id | str | Role Client ID allowed to use the key for signing. | | key_name | str | Name of the key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -948,7 +948,7 @@ identityOidcKeyAllowedClientId.IdentityOidcKeyAllowedClientIdConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | allowed_client_id | str | Role Client ID allowed to use the key for signing. | | key_name | str | Name of the key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1033,7 +1033,7 @@ allowed_client_id: str Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -1047,7 +1047,7 @@ key_name: str Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -1059,7 +1059,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcKeyAllowedClientId.typescript.md b/docs/identityOidcKeyAllowedClientId.typescript.md index 9d1565e5..1d9cb3fd 100644 --- a/docs/identityOidcKeyAllowedClientId.typescript.md +++ b/docs/identityOidcKeyAllowedClientId.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ const identityOidcKeyAllowedClientIdConfig: identityOidcKeyAllowedClientId.Ident | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | allowedClientId | string | Role Client ID allowed to use the key for signing. | | keyName | string | Name of the key. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ public readonly allowedClientId: string; Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -886,7 +886,7 @@ public readonly keyName: string; Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -898,7 +898,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcProvider.csharp.md b/docs/identityOidcProvider.csharp.md index 909a6ffe..9eee18c5 100644 --- a/docs/identityOidcProvider.csharp.md +++ b/docs/identityOidcProvider.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ new IdentityOidcProviderConfig { | Name | string | The name of the provider. | | AllowedClientIds | string[] | The client IDs that are permitted to use the provider. | | HttpsEnabled | object | Set to true if the issuer endpoint uses HTTPS. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | IssuerHost | string | The host for the issuer. Can be either host or host:port. | | Namespace | string | Target namespace. (requires Enterprise). | | ScopesSupported | string[] | The scopes available for requesting on the provider. | @@ -995,7 +995,7 @@ public string Name { get; set; } The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -1011,7 +1011,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1025,7 +1025,7 @@ public object HttpsEnabled { get; set; } Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1037,7 +1037,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1054,7 +1054,7 @@ public string IssuerHost { get; set; } The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1068,7 +1068,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1082,7 +1082,7 @@ public string[] ScopesSupported { get; set; } The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcProvider.go.md b/docs/identityOidcProvider.go.md index 2d818e40..66d239bb 100644 --- a/docs/identityOidcProvider.go.md +++ b/docs/identityOidcProvider.go.md @@ -4,12 +4,12 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcprovider" identityoidcprovider.NewIdentityOidcProvider(scope Construct, id *string, config IdentityOidcProviderConfig) IdentityOidcProvider ``` @@ -420,7 +420,7 @@ func ResetScopesSupported() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcprovider" identityoidcprovider.IdentityOidcProvider_IsConstruct(x interface{}) *bool ``` @@ -452,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcprovider" identityoidcprovider.IdentityOidcProvider_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +466,7 @@ identityoidcprovider.IdentityOidcProvider_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcprovider" identityoidcprovider.IdentityOidcProvider_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +480,7 @@ identityoidcprovider.IdentityOidcProvider_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcprovider" identityoidcprovider.IdentityOidcProvider_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -874,7 +874,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcprovider" &identityoidcprovider.IdentityOidcProviderConfig { Connection: interface{}, @@ -908,7 +908,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcprovider" | Name | *string | The name of the provider. | | AllowedClientIds | *[]*string | The client IDs that are permitted to use the provider. | | HttpsEnabled | interface{} | Set to true if the issuer endpoint uses HTTPS. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | IssuerHost | *string | The host for the issuer. Can be either host or host:port. | | Namespace | *string | Target namespace. (requires Enterprise). | | ScopesSupported | *[]*string | The scopes available for requesting on the provider. | @@ -995,7 +995,7 @@ Name *string The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -1011,7 +1011,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1025,7 +1025,7 @@ HttpsEnabled interface{} Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1037,7 +1037,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1054,7 +1054,7 @@ IssuerHost *string The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1068,7 +1068,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1082,7 +1082,7 @@ ScopesSupported *[]*string The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcProvider.java.md b/docs/identityOidcProvider.java.md index e6cbcdc7..6f18deba 100644 --- a/docs/identityOidcProvider.java.md +++ b/docs/identityOidcProvider.java.md @@ -4,7 +4,7 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers @@ -48,7 +48,7 @@ IdentityOidcProvider.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the provider. | | allowedClientIds | java.util.List | The client IDs that are permitted to use the provider. | | httpsEnabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Set to true if the issuer endpoint uses HTTPS. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuerHost | java.lang.String | The host for the issuer. Can be either host or host:port. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | scopesSupported | java.util.List | The scopes available for requesting on the provider. | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -133,7 +133,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -164,7 +164,7 @@ If you experience problems setting this value it might not be settable. Please t The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- @@ -653,7 +653,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -1057,7 +1057,7 @@ IdentityOidcProviderConfig.builder() | name | java.lang.String | The name of the provider. | | allowedClientIds | java.util.List | The client IDs that are permitted to use the provider. | | httpsEnabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Set to true if the issuer endpoint uses HTTPS. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuerHost | java.lang.String | The host for the issuer. Can be either host or host:port. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | scopesSupported | java.util.List | The scopes available for requesting on the provider. | @@ -1144,7 +1144,7 @@ public java.lang.String getName(); The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -1160,7 +1160,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1174,7 +1174,7 @@ public java.lang.Object getHttpsEnabled(); Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1186,7 +1186,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1203,7 +1203,7 @@ public java.lang.String getIssuerHost(); The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1217,7 +1217,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1231,7 +1231,7 @@ public java.util.List getScopesSupported(); The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcProvider.python.md b/docs/identityOidcProvider.python.md index 820fa64e..7b29ff54 100644 --- a/docs/identityOidcProvider.python.md +++ b/docs/identityOidcProvider.python.md @@ -4,7 +4,7 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers @@ -45,7 +45,7 @@ identityOidcProvider.IdentityOidcProvider( | name | str | The name of the provider. | | allowed_client_ids | typing.List[str] | The client IDs that are permitted to use the provider. | | https_enabled | typing.Union[bool, cdktf.IResolvable] | Set to true if the issuer endpoint uses HTTPS. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuer_host | str | The host for the issuer. Can be either host or host:port. | | namespace | str | Target namespace. (requires Enterprise). | | scopes_supported | typing.List[str] | The scopes available for requesting on the provider. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -130,7 +130,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- @@ -696,7 +696,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -1095,7 +1095,7 @@ identityOidcProvider.IdentityOidcProviderConfig( | name | str | The name of the provider. | | allowed_client_ids | typing.List[str] | The client IDs that are permitted to use the provider. | | https_enabled | typing.Union[bool, cdktf.IResolvable] | Set to true if the issuer endpoint uses HTTPS. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuer_host | str | The host for the issuer. Can be either host or host:port. | | namespace | str | Target namespace. (requires Enterprise). | | scopes_supported | typing.List[str] | The scopes available for requesting on the provider. | @@ -1182,7 +1182,7 @@ name: str The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -1198,7 +1198,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1212,7 +1212,7 @@ https_enabled: typing.Union[bool, IResolvable] Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1224,7 +1224,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1241,7 +1241,7 @@ issuer_host: str The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1255,7 +1255,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1269,7 +1269,7 @@ scopes_supported: typing.List[str] The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcProvider.typescript.md b/docs/identityOidcProvider.typescript.md index e658098d..bca518eb 100644 --- a/docs/identityOidcProvider.typescript.md +++ b/docs/identityOidcProvider.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -893,7 +893,7 @@ const identityOidcProviderConfig: identityOidcProvider.IdentityOidcProviderConfi | name | string | The name of the provider. | | allowedClientIds | string[] | The client IDs that are permitted to use the provider. | | httpsEnabled | boolean \| cdktf.IResolvable | Set to true if the issuer endpoint uses HTTPS. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuerHost | string | The host for the issuer. Can be either host or host:port. | | namespace | string | Target namespace. (requires Enterprise). | | scopesSupported | string[] | The scopes available for requesting on the provider. | @@ -980,7 +980,7 @@ public readonly name: string; The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -996,7 +996,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1010,7 +1010,7 @@ public readonly httpsEnabled: boolean | IResolvable; Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1022,7 +1022,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1039,7 +1039,7 @@ public readonly issuerHost: string; The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1053,7 +1053,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1067,7 +1067,7 @@ public readonly scopesSupported: string[]; The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcRole.csharp.md b/docs/identityOidcRole.csharp.md index b0ca8d43..8f4f0a4b 100644 --- a/docs/identityOidcRole.csharp.md +++ b/docs/identityOidcRole.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -890,7 +890,7 @@ new IdentityOidcRoleConfig { | Key | string | A configured named key, the key must already exist. | | Name | string | Name of the role. | | ClientId | string | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Template | string | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | Ttl | double | TTL of the tokens generated against the role in number of seconds. | @@ -977,7 +977,7 @@ public string Key { get; set; } A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -991,7 +991,7 @@ public string Name { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -1005,7 +1005,7 @@ public string ClientId { get; set; } The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1017,7 +1017,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1048,7 +1048,7 @@ public string Template { get; set; } The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1062,7 +1062,7 @@ public double Ttl { get; set; } TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcRole.go.md b/docs/identityOidcRole.go.md index 3ee52619..e8023079 100644 --- a/docs/identityOidcRole.go.md +++ b/docs/identityOidcRole.go.md @@ -4,12 +4,12 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcrole" identityoidcrole.NewIdentityOidcRole(scope Construct, id *string, config IdentityOidcRoleConfig) IdentityOidcRole ``` @@ -413,7 +413,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcrole" identityoidcrole.IdentityOidcRole_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcrole" identityoidcrole.IdentityOidcRole_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ identityoidcrole.IdentityOidcRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcrole" identityoidcrole.IdentityOidcRole_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ identityoidcrole.IdentityOidcRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcrole" identityoidcrole.IdentityOidcRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -856,7 +856,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcrole" &identityoidcrole.IdentityOidcRoleConfig { Connection: interface{}, @@ -890,7 +890,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcrole" | Key | *string | A configured named key, the key must already exist. | | Name | *string | Name of the role. | | ClientId | *string | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Template | *string | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | Ttl | *f64 | TTL of the tokens generated against the role in number of seconds. | @@ -977,7 +977,7 @@ Key *string A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -991,7 +991,7 @@ Name *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -1005,7 +1005,7 @@ ClientId *string The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1017,7 +1017,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1048,7 +1048,7 @@ Template *string The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1062,7 +1062,7 @@ Ttl *f64 TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcRole.java.md b/docs/identityOidcRole.java.md index 36734752..6f4f78af 100644 --- a/docs/identityOidcRole.java.md +++ b/docs/identityOidcRole.java.md @@ -4,7 +4,7 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers @@ -47,7 +47,7 @@ IdentityOidcRole.Builder.create(Construct scope, java.lang.String id) | key | java.lang.String | A configured named key, the key must already exist. | | name | java.lang.String | Name of the role. | | clientId | java.lang.String | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | java.lang.Number | TTL of the tokens generated against the role in number of seconds. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- @@ -643,7 +643,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -1035,7 +1035,7 @@ IdentityOidcRoleConfig.builder() | key | java.lang.String | A configured named key, the key must already exist. | | name | java.lang.String | Name of the role. | | clientId | java.lang.String | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | java.lang.Number | TTL of the tokens generated against the role in number of seconds. | @@ -1122,7 +1122,7 @@ public java.lang.String getKey(); A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -1136,7 +1136,7 @@ public java.lang.String getName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -1150,7 +1150,7 @@ public java.lang.String getClientId(); The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1162,7 +1162,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1179,7 +1179,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1193,7 +1193,7 @@ public java.lang.String getTemplate(); The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1207,7 +1207,7 @@ public java.lang.Number getTtl(); TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcRole.python.md b/docs/identityOidcRole.python.md index 9b6bc13b..7d9d08d1 100644 --- a/docs/identityOidcRole.python.md +++ b/docs/identityOidcRole.python.md @@ -4,7 +4,7 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers @@ -45,7 +45,7 @@ identityOidcRole.IdentityOidcRole( | key | str | A configured named key, the key must already exist. | | name | str | Name of the role. | | client_id | str | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | typing.Union[int, float] | TTL of the tokens generated against the role in number of seconds. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- @@ -687,7 +687,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -1075,7 +1075,7 @@ identityOidcRole.IdentityOidcRoleConfig( | key | str | A configured named key, the key must already exist. | | name | str | Name of the role. | | client_id | str | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | typing.Union[int, float] | TTL of the tokens generated against the role in number of seconds. | @@ -1162,7 +1162,7 @@ key: str A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -1176,7 +1176,7 @@ name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -1190,7 +1190,7 @@ client_id: str The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1202,7 +1202,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1219,7 +1219,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1233,7 +1233,7 @@ template: str The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1247,7 +1247,7 @@ ttl: typing.Union[int, float] TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcRole.typescript.md b/docs/identityOidcRole.typescript.md index 3782a760..7432ab28 100644 --- a/docs/identityOidcRole.typescript.md +++ b/docs/identityOidcRole.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ const identityOidcRoleConfig: identityOidcRole.IdentityOidcRoleConfig = { ... } | key | string | A configured named key, the key must already exist. | | name | string | Name of the role. | | clientId | string | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | template | string | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | number | TTL of the tokens generated against the role in number of seconds. | @@ -962,7 +962,7 @@ public readonly key: string; A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -976,7 +976,7 @@ public readonly name: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -990,7 +990,7 @@ public readonly clientId: string; The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1002,7 +1002,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1019,7 +1019,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1033,7 +1033,7 @@ public readonly template: string; The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1047,7 +1047,7 @@ public readonly ttl: number; TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcScope.csharp.md b/docs/identityOidcScope.csharp.md index 170e840b..858d3c0d 100644 --- a/docs/identityOidcScope.csharp.md +++ b/docs/identityOidcScope.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new IdentityOidcScopeConfig { | Provisioners | object[] | *No description.* | | Name | string | The name of the scope. The openid scope name is reserved. | | Description | string | The scope's description. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Template | string | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -922,7 +922,7 @@ public string Name { get; set; } The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -936,7 +936,7 @@ public string Description { get; set; } The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -979,7 +979,7 @@ public string Template { get; set; } The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/identityOidcScope.go.md b/docs/identityOidcScope.go.md index 9297028f..8079e9f1 100644 --- a/docs/identityOidcScope.go.md +++ b/docs/identityOidcScope.go.md @@ -4,12 +4,12 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcscope" identityoidcscope.NewIdentityOidcScope(scope Construct, id *string, config IdentityOidcScopeConfig) IdentityOidcScope ``` @@ -406,7 +406,7 @@ func ResetTemplate() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcscope" identityoidcscope.IdentityOidcScope_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcscope" identityoidcscope.IdentityOidcScope_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ identityoidcscope.IdentityOidcScope_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcscope" identityoidcscope.IdentityOidcScope_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ identityoidcscope.IdentityOidcScope_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcscope" identityoidcscope.IdentityOidcScope_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -805,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcscope" &identityoidcscope.IdentityOidcScopeConfig { Connection: interface{}, @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/identityoidcscope" | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the scope. The openid scope name is reserved. | | Description | *string | The scope's description. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Template | *string | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -922,7 +922,7 @@ Name *string The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -936,7 +936,7 @@ Description *string The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -979,7 +979,7 @@ Template *string The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/identityOidcScope.java.md b/docs/identityOidcScope.java.md index 5b4215ca..31750bf2 100644 --- a/docs/identityOidcScope.java.md +++ b/docs/identityOidcScope.java.md @@ -4,7 +4,7 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers @@ -44,7 +44,7 @@ IdentityOidcScope.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the scope. The openid scope name is reserved. | | description | java.lang.String | The scope's description. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -957,7 +957,7 @@ IdentityOidcScopeConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the scope. The openid scope name is reserved. | | description | java.lang.String | The scope's description. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -1043,7 +1043,7 @@ public java.lang.String getName(); The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -1057,7 +1057,7 @@ public java.lang.String getDescription(); The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -1100,7 +1100,7 @@ public java.lang.String getTemplate(); The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/identityOidcScope.python.md b/docs/identityOidcScope.python.md index 65a6acb1..4ea7d40b 100644 --- a/docs/identityOidcScope.python.md +++ b/docs/identityOidcScope.python.md @@ -4,7 +4,7 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers @@ -42,7 +42,7 @@ identityOidcScope.IdentityOidcScope( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the scope. The openid scope name is reserved. | | description | str | The scope's description. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ identityOidcScope.IdentityOidcScopeConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the scope. The openid scope name is reserved. | | description | str | The scope's description. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -1083,7 +1083,7 @@ name: str The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -1097,7 +1097,7 @@ description: str The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -1140,7 +1140,7 @@ template: str The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/identityOidcScope.typescript.md b/docs/identityOidcScope.typescript.md index c445dc90..e0cec782 100644 --- a/docs/identityOidcScope.typescript.md +++ b/docs/identityOidcScope.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const identityOidcScopeConfig: identityOidcScope.IdentityOidcScopeConfig = { ... | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the scope. The openid scope name is reserved. | | description | string | The scope's description. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | string | Target namespace. (requires Enterprise). | | template | string | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -909,7 +909,7 @@ public readonly name: string; The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -923,7 +923,7 @@ public readonly description: string; The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -966,7 +966,7 @@ public readonly template: string; The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/jwtAuthBackend.csharp.md b/docs/jwtAuthBackend.csharp.md index 75922713..1ce24b7c 100644 --- a/docs/jwtAuthBackend.csharp.md +++ b/docs/jwtAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers @@ -634,7 +634,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1379,7 +1379,7 @@ new JwtAuthBackendConfig { | DefaultRole | string | The default role to use if none is provided during login. | | Description | string | The description of the auth backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | JwksCaPem | string | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | JwksUrl | string | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | JwtSupportedAlgs | string[] | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1395,7 +1395,7 @@ new JwtAuthBackendConfig { | OidcResponseTypes | string[] | The response types to request. | | Path | string | path to mount the backend. | | ProviderConfig | System.Collections.Generic.IDictionary | Provider specific handling configuration. | -| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | Type | string | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1480,7 +1480,7 @@ public string BoundIssuer { get; set; } The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1494,7 +1494,7 @@ public string DefaultRole { get; set; } The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1508,7 +1508,7 @@ public string Description { get; set; } The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1522,7 +1522,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1534,7 +1534,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1553,7 +1553,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1567,7 +1567,7 @@ public string JwksUrl { get; set; } JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1581,7 +1581,7 @@ public string[] JwtSupportedAlgs { get; set; } A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1597,7 +1597,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1611,7 +1611,7 @@ public object Local { get; set; } Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -1625,7 +1625,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -1641,7 +1641,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -1655,7 +1655,7 @@ public string OidcClientId { get; set; } Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -1669,7 +1669,7 @@ public string OidcClientSecret { get; set; } Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -1685,7 +1685,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -1699,7 +1699,7 @@ public string OidcDiscoveryUrl { get; set; } The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -1715,7 +1715,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -1731,7 +1731,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -1745,7 +1745,7 @@ public string Path { get; set; } path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -1759,7 +1759,7 @@ public System.Collections.Generic.IDictionary ProviderConfig { g Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -1771,7 +1771,7 @@ public object Tune { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -1785,7 +1785,7 @@ public string Type { get; set; } Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -1812,14 +1812,14 @@ new JwtAuthBackendTune { | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -1831,7 +1831,7 @@ public string[] AllowedResponseHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -1843,7 +1843,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -1855,7 +1855,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -1867,7 +1867,7 @@ public string DefaultLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -1879,7 +1879,7 @@ public string ListingVisibility { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -1891,7 +1891,7 @@ public string MaxLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -1903,7 +1903,7 @@ public string[] PassthroughRequestHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -1915,7 +1915,7 @@ public string TokenType { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- diff --git a/docs/jwtAuthBackend.go.md b/docs/jwtAuthBackend.go.md index 088bfdbd..a8926e01 100644 --- a/docs/jwtAuthBackend.go.md +++ b/docs/jwtAuthBackend.go.md @@ -4,12 +4,12 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" jwtauthbackend.NewJwtAuthBackend(scope Construct, id *string, config JwtAuthBackendConfig) JwtAuthBackend ``` @@ -545,7 +545,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" jwtauthbackend.JwtAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -577,7 +577,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" jwtauthbackend.JwtAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -591,7 +591,7 @@ jwtauthbackend.JwtAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" jwtauthbackend.JwtAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -605,7 +605,7 @@ jwtauthbackend.JwtAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" jwtauthbackend.JwtAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -634,7 +634,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1329,7 +1329,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" &jwtauthbackend.JwtAuthBackendConfig { Connection: interface{}, @@ -1379,7 +1379,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" | DefaultRole | *string | The default role to use if none is provided during login. | | Description | *string | The description of the auth backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | JwksCaPem | *string | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | JwksUrl | *string | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | JwtSupportedAlgs | *[]*string | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1395,7 +1395,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" | OidcResponseTypes | *[]*string | The response types to request. | | Path | *string | path to mount the backend. | | ProviderConfig | *map[string]*string | Provider specific handling configuration. | -| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | Type | *string | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1480,7 +1480,7 @@ BoundIssuer *string The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1494,7 +1494,7 @@ DefaultRole *string The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1508,7 +1508,7 @@ Description *string The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1522,7 +1522,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1534,7 +1534,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1553,7 +1553,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1567,7 +1567,7 @@ JwksUrl *string JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1581,7 +1581,7 @@ JwtSupportedAlgs *[]*string A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1597,7 +1597,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1611,7 +1611,7 @@ Local interface{} Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -1625,7 +1625,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -1641,7 +1641,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -1655,7 +1655,7 @@ OidcClientId *string Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -1669,7 +1669,7 @@ OidcClientSecret *string Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -1685,7 +1685,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -1699,7 +1699,7 @@ OidcDiscoveryUrl *string The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -1715,7 +1715,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -1731,7 +1731,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -1745,7 +1745,7 @@ Path *string path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -1759,7 +1759,7 @@ ProviderConfig *map[string]*string Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -1771,7 +1771,7 @@ Tune interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -1785,7 +1785,7 @@ Type *string Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -1794,7 +1794,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" &jwtauthbackend.JwtAuthBackendTune { AllowedResponseHeaders: *[]*string, @@ -1812,14 +1812,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -1831,7 +1831,7 @@ AllowedResponseHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -1843,7 +1843,7 @@ AuditNonHmacRequestKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -1855,7 +1855,7 @@ AuditNonHmacResponseKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -1867,7 +1867,7 @@ DefaultLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -1879,7 +1879,7 @@ ListingVisibility *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -1891,7 +1891,7 @@ MaxLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -1903,7 +1903,7 @@ PassthroughRequestHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -1915,7 +1915,7 @@ TokenType *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- @@ -1926,7 +1926,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" jwtauthbackend.NewJwtAuthBackendTuneList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) JwtAuthBackendTuneList ``` @@ -2086,7 +2086,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" jwtauthbackend.NewJwtAuthBackendTuneOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) JwtAuthBackendTuneOutputReference ``` diff --git a/docs/jwtAuthBackend.java.md b/docs/jwtAuthBackend.java.md index 4d893f14..877cc080 100644 --- a/docs/jwtAuthBackend.java.md +++ b/docs/jwtAuthBackend.java.md @@ -4,7 +4,7 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers @@ -67,7 +67,7 @@ JwtAuthBackend.Builder.create(Construct scope, java.lang.String id) | defaultRole | java.lang.String | The default role to use if none is provided during login. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwksCaPem | java.lang.String | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwksUrl | java.lang.String | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwtSupportedAlgs | java.util.List | A list of supported signing algorithms. Defaults to [RS256]. | @@ -83,7 +83,7 @@ JwtAuthBackend.Builder.create(Construct scope, java.lang.String id) | oidcResponseTypes | java.util.List | The response types to request. | | path | java.lang.String | path to mount the backend. | | providerConfig | java.util.Map | Provider specific handling configuration. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | java.lang.String | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -154,7 +154,7 @@ Must be unique amongst siblings in the same scope The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -207,7 +207,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -239,7 +239,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -271,7 +271,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -303,7 +303,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -325,7 +325,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -337,7 +337,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -347,7 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -357,7 +357,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -969,7 +969,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1722,7 +1722,7 @@ JwtAuthBackendConfig.builder() | defaultRole | java.lang.String | The default role to use if none is provided during login. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwksCaPem | java.lang.String | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwksUrl | java.lang.String | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwtSupportedAlgs | java.util.List | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1738,7 +1738,7 @@ JwtAuthBackendConfig.builder() | oidcResponseTypes | java.util.List | The response types to request. | | path | java.lang.String | path to mount the backend. | | providerConfig | java.util.Map | Provider specific handling configuration. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | java.lang.String | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1823,7 +1823,7 @@ public java.lang.String getBoundIssuer(); The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1837,7 +1837,7 @@ public java.lang.String getDefaultRole(); The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1851,7 +1851,7 @@ public java.lang.String getDescription(); The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1865,7 +1865,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1877,7 +1877,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1896,7 +1896,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1910,7 +1910,7 @@ public java.lang.String getJwksUrl(); JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1924,7 +1924,7 @@ public java.util.List getJwtSupportedAlgs(); A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1940,7 +1940,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1954,7 +1954,7 @@ public java.lang.Object getLocal(); Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -1968,7 +1968,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -1984,7 +1984,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -1998,7 +1998,7 @@ public java.lang.String getOidcClientId(); Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -2012,7 +2012,7 @@ public java.lang.String getOidcClientSecret(); Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -2028,7 +2028,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -2042,7 +2042,7 @@ public java.lang.String getOidcDiscoveryUrl(); The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -2058,7 +2058,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -2074,7 +2074,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -2088,7 +2088,7 @@ public java.lang.String getPath(); path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -2102,7 +2102,7 @@ public java.util.Map getProviderConfig(); Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -2114,7 +2114,7 @@ public java.lang.Object getTune(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -2128,7 +2128,7 @@ public java.lang.String getType(); Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -2155,14 +2155,14 @@ JwtAuthBackendTune.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -2174,7 +2174,7 @@ public java.util.List getAllowedResponseHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -2186,7 +2186,7 @@ public java.util.List getAuditNonHmacRequestKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -2198,7 +2198,7 @@ public java.util.List getAuditNonHmacResponseKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -2210,7 +2210,7 @@ public java.lang.String getDefaultLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -2222,7 +2222,7 @@ public java.lang.String getListingVisibility(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -2234,7 +2234,7 @@ public java.lang.String getMaxLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -2246,7 +2246,7 @@ public java.util.List getPassthroughRequestHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -2258,7 +2258,7 @@ public java.lang.String getTokenType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- diff --git a/docs/jwtAuthBackend.python.md b/docs/jwtAuthBackend.python.md index d8a57234..e7cdb100 100644 --- a/docs/jwtAuthBackend.python.md +++ b/docs/jwtAuthBackend.python.md @@ -4,7 +4,7 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers @@ -61,7 +61,7 @@ jwtAuthBackend.JwtAuthBackend( | default_role | str | The default role to use if none is provided during login. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwks_ca_pem | str | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwks_url | str | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwt_supported_algs | typing.List[str] | A list of supported signing algorithms. Defaults to [RS256]. | @@ -77,7 +77,7 @@ jwtAuthBackend.JwtAuthBackend( | oidc_response_types | typing.List[str] | The response types to request. | | path | str | path to mount the backend. | | provider_config | typing.Mapping[str] | Provider specific handling configuration. | -| tune | typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | str | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -148,7 +148,7 @@ Must be unique amongst siblings in the same scope The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -201,7 +201,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -233,7 +233,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -265,7 +265,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -297,7 +297,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -307,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -319,7 +319,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -331,7 +331,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -341,7 +341,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -351,7 +351,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -369,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -1011,7 +1011,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1756,7 +1756,7 @@ jwtAuthBackend.JwtAuthBackendConfig( | default_role | str | The default role to use if none is provided during login. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwks_ca_pem | str | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwks_url | str | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwt_supported_algs | typing.List[str] | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1772,7 +1772,7 @@ jwtAuthBackend.JwtAuthBackendConfig( | oidc_response_types | typing.List[str] | The response types to request. | | path | str | path to mount the backend. | | provider_config | typing.Mapping[str] | Provider specific handling configuration. | -| tune | typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | str | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1857,7 +1857,7 @@ bound_issuer: str The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1871,7 +1871,7 @@ default_role: str The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1885,7 +1885,7 @@ description: str The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1899,7 +1899,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1911,7 +1911,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1930,7 +1930,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1944,7 +1944,7 @@ jwks_url: str JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1958,7 +1958,7 @@ jwt_supported_algs: typing.List[str] A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1974,7 +1974,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1988,7 +1988,7 @@ local: typing.Union[bool, IResolvable] Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -2002,7 +2002,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -2018,7 +2018,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -2032,7 +2032,7 @@ oidc_client_id: str Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -2046,7 +2046,7 @@ oidc_client_secret: str Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -2062,7 +2062,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -2076,7 +2076,7 @@ oidc_discovery_url: str The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -2092,7 +2092,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -2108,7 +2108,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -2122,7 +2122,7 @@ path: str path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -2136,7 +2136,7 @@ provider_config: typing.Mapping[str] Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -2148,7 +2148,7 @@ tune: typing.Union[IResolvable, typing.List[JwtAuthBackendTune]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -2162,7 +2162,7 @@ type: str Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -2189,14 +2189,14 @@ jwtAuthBackend.JwtAuthBackendTune( | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -2208,7 +2208,7 @@ allowed_response_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -2220,7 +2220,7 @@ audit_non_hmac_request_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -2232,7 +2232,7 @@ audit_non_hmac_response_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -2244,7 +2244,7 @@ default_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -2256,7 +2256,7 @@ listing_visibility: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -2268,7 +2268,7 @@ max_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -2280,7 +2280,7 @@ passthrough_request_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -2292,7 +2292,7 @@ token_type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- diff --git a/docs/jwtAuthBackend.typescript.md b/docs/jwtAuthBackend.typescript.md index 53af704f..c7cbc982 100644 --- a/docs/jwtAuthBackend.typescript.md +++ b/docs/jwtAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers @@ -634,7 +634,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1349,7 +1349,7 @@ const jwtAuthBackendConfig: jwtAuthBackend.JwtAuthBackendConfig = { ... } | defaultRole | string | The default role to use if none is provided during login. | | description | string | The description of the auth backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwksCaPem | string | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwksUrl | string | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwtSupportedAlgs | string[] | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1365,7 +1365,7 @@ const jwtAuthBackendConfig: jwtAuthBackend.JwtAuthBackendConfig = { ... } | oidcResponseTypes | string[] | The response types to request. | | path | string | path to mount the backend. | | providerConfig | {[ key: string ]: string} | Provider specific handling configuration. | -| tune | cdktf.IResolvable \| JwtAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | cdktf.IResolvable \| JwtAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | string | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1450,7 +1450,7 @@ public readonly boundIssuer: string; The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1464,7 +1464,7 @@ public readonly defaultRole: string; The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1478,7 +1478,7 @@ public readonly description: string; The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1492,7 +1492,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1504,7 +1504,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1523,7 +1523,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1537,7 +1537,7 @@ public readonly jwksUrl: string; JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1551,7 +1551,7 @@ public readonly jwtSupportedAlgs: string[]; A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1567,7 +1567,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1581,7 +1581,7 @@ public readonly local: boolean | IResolvable; Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -1595,7 +1595,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -1611,7 +1611,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -1625,7 +1625,7 @@ public readonly oidcClientId: string; Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -1639,7 +1639,7 @@ public readonly oidcClientSecret: string; Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -1655,7 +1655,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -1669,7 +1669,7 @@ public readonly oidcDiscoveryUrl: string; The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -1685,7 +1685,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -1701,7 +1701,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -1715,7 +1715,7 @@ public readonly path: string; path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -1729,7 +1729,7 @@ public readonly providerConfig: {[ key: string ]: string}; Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -1741,7 +1741,7 @@ public readonly tune: IResolvable | JwtAuthBackendTune[]; - *Type:* cdktf.IResolvable | JwtAuthBackendTune[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -1755,7 +1755,7 @@ public readonly type: string; Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -1773,14 +1773,14 @@ const jwtAuthBackendTune: jwtAuthBackend.JwtAuthBackendTune = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -1792,7 +1792,7 @@ public readonly allowedResponseHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -1804,7 +1804,7 @@ public readonly auditNonHmacRequestKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -1816,7 +1816,7 @@ public readonly auditNonHmacResponseKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -1828,7 +1828,7 @@ public readonly defaultLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -1840,7 +1840,7 @@ public readonly listingVisibility: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -1852,7 +1852,7 @@ public readonly maxLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -1864,7 +1864,7 @@ public readonly passthroughRequestHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -1876,7 +1876,7 @@ public readonly tokenType: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- diff --git a/docs/jwtAuthBackendRole.csharp.md b/docs/jwtAuthBackendRole.csharp.md index 2f136484..d113420a 100644 --- a/docs/jwtAuthBackendRole.csharp.md +++ b/docs/jwtAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1590,7 +1590,7 @@ new JwtAuthBackendRoleConfig { | DisableBoundClaimsParsing | object | Disable bound claim value parsing. Useful when values contain commas. | | ExpirationLeeway | double | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | GroupsClaim | string | The claim to use to uniquely identify the set of groups to which the user belongs; | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | MaxAge | double | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | Namespace | string | Target namespace. (requires Enterprise). | | NotBeforeLeeway | double | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -1690,7 +1690,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -1706,7 +1706,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -1720,7 +1720,7 @@ public string[] AllowedRedirectUris { get; set; } The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -1734,7 +1734,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -1748,7 +1748,7 @@ public string[] BoundAudiences { get; set; } List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -1762,7 +1762,7 @@ public System.Collections.Generic.IDictionary BoundClaims { get; Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -1776,7 +1776,7 @@ public string BoundClaimsType { get; set; } How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -1790,7 +1790,7 @@ public string BoundSubject { get; set; } If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -1804,7 +1804,7 @@ public System.Collections.Generic.IDictionary ClaimMappings { ge Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -1820,7 +1820,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -1834,7 +1834,7 @@ public object DisableBoundClaimsParsing { get; set; } Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -1850,7 +1850,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -1866,7 +1866,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -1878,7 +1878,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1895,7 +1895,7 @@ public double MaxAge { get; set; } Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -1909,7 +1909,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -1925,7 +1925,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -1941,7 +1941,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -1955,7 +1955,7 @@ public string RoleType { get; set; } Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -1969,7 +1969,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -1983,7 +1983,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -1997,7 +1997,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -2011,7 +2011,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -2025,7 +2025,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2039,7 +2039,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2053,7 +2053,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2067,7 +2067,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2081,7 +2081,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2097,7 +2097,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2113,7 +2113,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/jwtAuthBackendRole.go.md b/docs/jwtAuthBackendRole.go.md index 00639038..244a3a3e 100644 --- a/docs/jwtAuthBackendRole.go.md +++ b/docs/jwtAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackendrole" jwtauthbackendrole.NewJwtAuthBackendRole(scope Construct, id *string, config JwtAuthBackendRoleConfig) JwtAuthBackendRole ``` @@ -574,7 +574,7 @@ func ResetVerboseOidcLogging() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackendrole" jwtauthbackendrole.JwtAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -606,7 +606,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackendrole" jwtauthbackendrole.JwtAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -620,7 +620,7 @@ jwtauthbackendrole.JwtAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackendrole" jwtauthbackendrole.JwtAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -634,7 +634,7 @@ jwtauthbackendrole.JwtAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackendrole" jwtauthbackendrole.JwtAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -663,7 +663,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1523,7 +1523,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackendrole" &jwtauthbackendrole.JwtAuthBackendRoleConfig { Connection: interface{}, @@ -1590,7 +1590,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/jwtauthbackendrole" | DisableBoundClaimsParsing | interface{} | Disable bound claim value parsing. Useful when values contain commas. | | ExpirationLeeway | *f64 | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | GroupsClaim | *string | The claim to use to uniquely identify the set of groups to which the user belongs; | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | MaxAge | *f64 | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | Namespace | *string | Target namespace. (requires Enterprise). | | NotBeforeLeeway | *f64 | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -1690,7 +1690,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -1706,7 +1706,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -1720,7 +1720,7 @@ AllowedRedirectUris *[]*string The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -1734,7 +1734,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -1748,7 +1748,7 @@ BoundAudiences *[]*string List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -1762,7 +1762,7 @@ BoundClaims *map[string]*string Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -1776,7 +1776,7 @@ BoundClaimsType *string How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -1790,7 +1790,7 @@ BoundSubject *string If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -1804,7 +1804,7 @@ ClaimMappings *map[string]*string Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -1820,7 +1820,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -1834,7 +1834,7 @@ DisableBoundClaimsParsing interface{} Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -1850,7 +1850,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -1866,7 +1866,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -1878,7 +1878,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1895,7 +1895,7 @@ MaxAge *f64 Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -1909,7 +1909,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -1925,7 +1925,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -1941,7 +1941,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -1955,7 +1955,7 @@ RoleType *string Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -1969,7 +1969,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -1983,7 +1983,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -1997,7 +1997,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -2011,7 +2011,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -2025,7 +2025,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2039,7 +2039,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2053,7 +2053,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2067,7 +2067,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2081,7 +2081,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2097,7 +2097,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2113,7 +2113,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/jwtAuthBackendRole.java.md b/docs/jwtAuthBackendRole.java.md index bf534636..5ebf870f 100644 --- a/docs/jwtAuthBackendRole.java.md +++ b/docs/jwtAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers @@ -84,7 +84,7 @@ JwtAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | disableBoundClaimsParsing | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable bound claim value parsing. Useful when values contain commas. | | expirationLeeway | java.lang.Number | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groupsClaim | java.lang.String | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | maxAge | java.lang.Number | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | notBeforeLeeway | java.lang.Number | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -170,7 +170,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -182,7 +182,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -264,7 +264,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -274,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -286,7 +286,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -298,7 +298,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -319,7 +319,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -341,7 +341,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -353,7 +353,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -363,7 +363,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -373,7 +373,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -383,7 +383,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -393,7 +393,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -403,7 +403,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -413,7 +413,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -423,7 +423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -433,7 +433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -443,7 +443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -453,7 +453,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -465,7 +465,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -477,7 +477,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- @@ -1100,7 +1100,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2035,7 +2035,7 @@ JwtAuthBackendRoleConfig.builder() | disableBoundClaimsParsing | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable bound claim value parsing. Useful when values contain commas. | | expirationLeeway | java.lang.Number | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groupsClaim | java.lang.String | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | maxAge | java.lang.Number | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | notBeforeLeeway | java.lang.Number | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -2135,7 +2135,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -2151,7 +2151,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -2165,7 +2165,7 @@ public java.util.List getAllowedRedirectUris(); The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -2179,7 +2179,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -2193,7 +2193,7 @@ public java.util.List getBoundAudiences(); List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -2207,7 +2207,7 @@ public java.util.Map getBoundClaims(); Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -2221,7 +2221,7 @@ public java.lang.String getBoundClaimsType(); How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -2235,7 +2235,7 @@ public java.lang.String getBoundSubject(); If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -2249,7 +2249,7 @@ public java.util.Map getClaimMappings(); Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -2265,7 +2265,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -2279,7 +2279,7 @@ public java.lang.Object getDisableBoundClaimsParsing(); Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -2295,7 +2295,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -2311,7 +2311,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -2323,7 +2323,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2340,7 +2340,7 @@ public java.lang.Number getMaxAge(); Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -2354,7 +2354,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -2370,7 +2370,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -2386,7 +2386,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -2400,7 +2400,7 @@ public java.lang.String getRoleType(); Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -2414,7 +2414,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -2428,7 +2428,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -2442,7 +2442,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -2456,7 +2456,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -2470,7 +2470,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2484,7 +2484,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2498,7 +2498,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2512,7 +2512,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2526,7 +2526,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2542,7 +2542,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2558,7 +2558,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/jwtAuthBackendRole.python.md b/docs/jwtAuthBackendRole.python.md index 2036fb4f..192a6d48 100644 --- a/docs/jwtAuthBackendRole.python.md +++ b/docs/jwtAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers @@ -78,7 +78,7 @@ jwtAuthBackendRole.JwtAuthBackendRole( | disable_bound_claims_parsing | typing.Union[bool, cdktf.IResolvable] | Disable bound claim value parsing. Useful when values contain commas. | | expiration_leeway | typing.Union[int, float] | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groups_claim | str | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | max_age | typing.Union[int, float] | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | str | Target namespace. (requires Enterprise). | | not_before_leeway | typing.Union[int, float] | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -164,7 +164,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -176,7 +176,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -258,7 +258,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -280,7 +280,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -292,7 +292,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -300,7 +300,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -313,7 +313,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -335,7 +335,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -347,7 +347,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -357,7 +357,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -367,7 +367,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -377,7 +377,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -387,7 +387,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -397,7 +397,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -407,7 +407,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -417,7 +417,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -427,7 +427,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -437,7 +437,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -447,7 +447,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -459,7 +459,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -471,7 +471,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- @@ -1140,7 +1140,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2067,7 +2067,7 @@ jwtAuthBackendRole.JwtAuthBackendRoleConfig( | disable_bound_claims_parsing | typing.Union[bool, cdktf.IResolvable] | Disable bound claim value parsing. Useful when values contain commas. | | expiration_leeway | typing.Union[int, float] | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groups_claim | str | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | max_age | typing.Union[int, float] | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | str | Target namespace. (requires Enterprise). | | not_before_leeway | typing.Union[int, float] | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -2167,7 +2167,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -2183,7 +2183,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -2197,7 +2197,7 @@ allowed_redirect_uris: typing.List[str] The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -2211,7 +2211,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -2225,7 +2225,7 @@ bound_audiences: typing.List[str] List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -2239,7 +2239,7 @@ bound_claims: typing.Mapping[str] Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -2253,7 +2253,7 @@ bound_claims_type: str How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -2267,7 +2267,7 @@ bound_subject: str If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -2281,7 +2281,7 @@ claim_mappings: typing.Mapping[str] Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -2297,7 +2297,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -2311,7 +2311,7 @@ disable_bound_claims_parsing: typing.Union[bool, IResolvable] Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -2327,7 +2327,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -2343,7 +2343,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -2355,7 +2355,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2372,7 +2372,7 @@ max_age: typing.Union[int, float] Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -2386,7 +2386,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -2402,7 +2402,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -2418,7 +2418,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -2432,7 +2432,7 @@ role_type: str Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -2446,7 +2446,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -2460,7 +2460,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -2474,7 +2474,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -2488,7 +2488,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -2502,7 +2502,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2516,7 +2516,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2530,7 +2530,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2544,7 +2544,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2558,7 +2558,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2574,7 +2574,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2590,7 +2590,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/jwtAuthBackendRole.typescript.md b/docs/jwtAuthBackendRole.typescript.md index 3c581030..3b815e16 100644 --- a/docs/jwtAuthBackendRole.typescript.md +++ b/docs/jwtAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1552,7 +1552,7 @@ const jwtAuthBackendRoleConfig: jwtAuthBackendRole.JwtAuthBackendRoleConfig = { | disableBoundClaimsParsing | boolean \| cdktf.IResolvable | Disable bound claim value parsing. Useful when values contain commas. | | expirationLeeway | number | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groupsClaim | string | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | maxAge | number | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | string | Target namespace. (requires Enterprise). | | notBeforeLeeway | number | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -1652,7 +1652,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -1668,7 +1668,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -1682,7 +1682,7 @@ public readonly allowedRedirectUris: string[]; The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -1696,7 +1696,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -1710,7 +1710,7 @@ public readonly boundAudiences: string[]; List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -1724,7 +1724,7 @@ public readonly boundClaims: {[ key: string ]: string}; Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -1738,7 +1738,7 @@ public readonly boundClaimsType: string; How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -1752,7 +1752,7 @@ public readonly boundSubject: string; If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -1766,7 +1766,7 @@ public readonly claimMappings: {[ key: string ]: string}; Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -1782,7 +1782,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -1796,7 +1796,7 @@ public readonly disableBoundClaimsParsing: boolean | IResolvable; Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -1812,7 +1812,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -1828,7 +1828,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -1840,7 +1840,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1857,7 +1857,7 @@ public readonly maxAge: number; Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -1871,7 +1871,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -1887,7 +1887,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -1903,7 +1903,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -1917,7 +1917,7 @@ public readonly roleType: string; Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -1931,7 +1931,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -1945,7 +1945,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -1959,7 +1959,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -1973,7 +1973,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -1987,7 +1987,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2001,7 +2001,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2015,7 +2015,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2029,7 +2029,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2043,7 +2043,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2059,7 +2059,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2075,7 +2075,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/kmipSecretBackend.csharp.md b/docs/kmipSecretBackend.csharp.md index a3f4f7dd..55510f73 100644 --- a/docs/kmipSecretBackend.csharp.md +++ b/docs/kmipSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1110,7 +1110,7 @@ new KmipSecretBackendConfig { | DefaultTlsClientTtl | double | Client certificate TTL in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | ListenAddrs | string[] | Addresses the KMIP server should listen on (host:port). | | Namespace | string | Target namespace. (requires Enterprise). | | ServerHostnames | string[] | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1201,7 +1201,7 @@ public string Path { get; set; } Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1215,7 +1215,7 @@ public double DefaultTlsClientKeyBits { get; set; } Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1229,7 +1229,7 @@ public string DefaultTlsClientKeyType { get; set; } Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1243,7 +1243,7 @@ public double DefaultTlsClientTtl { get; set; } Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1257,7 +1257,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1271,7 +1271,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1283,7 +1283,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1300,7 +1300,7 @@ public string[] ListenAddrs { get; set; } Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1314,7 +1314,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1330,7 +1330,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1344,7 +1344,7 @@ public string[] ServerIps { get; set; } IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1358,7 +1358,7 @@ public double TlsCaKeyBits { get; set; } CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1372,7 +1372,7 @@ public string TlsCaKeyType { get; set; } CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1386,7 +1386,7 @@ public string TlsMinVersion { get; set; } Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretBackend.go.md b/docs/kmipSecretBackend.go.md index fcae8a95..3a7e4e6e 100644 --- a/docs/kmipSecretBackend.go.md +++ b/docs/kmipSecretBackend.go.md @@ -4,12 +4,12 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretbackend" kmipsecretbackend.NewKmipSecretBackend(scope Construct, id *string, config KmipSecretBackendConfig) KmipSecretBackend ``` @@ -469,7 +469,7 @@ func ResetTlsMinVersion() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretbackend" kmipsecretbackend.KmipSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -501,7 +501,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretbackend" kmipsecretbackend.KmipSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -515,7 +515,7 @@ kmipsecretbackend.KmipSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretbackend" kmipsecretbackend.KmipSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -529,7 +529,7 @@ kmipsecretbackend.KmipSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretbackend" kmipsecretbackend.KmipSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -558,7 +558,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1066,7 +1066,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretbackend" &kmipsecretbackend.KmipSecretBackendConfig { Connection: interface{}, @@ -1110,7 +1110,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretbackend" | DefaultTlsClientTtl | *f64 | Client certificate TTL in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | ListenAddrs | *[]*string | Addresses the KMIP server should listen on (host:port). | | Namespace | *string | Target namespace. (requires Enterprise). | | ServerHostnames | *[]*string | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1201,7 +1201,7 @@ Path *string Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1215,7 +1215,7 @@ DefaultTlsClientKeyBits *f64 Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1229,7 +1229,7 @@ DefaultTlsClientKeyType *string Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1243,7 +1243,7 @@ DefaultTlsClientTtl *f64 Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1257,7 +1257,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1271,7 +1271,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1283,7 +1283,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1300,7 +1300,7 @@ ListenAddrs *[]*string Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1314,7 +1314,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1330,7 +1330,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1344,7 +1344,7 @@ ServerIps *[]*string IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1358,7 +1358,7 @@ TlsCaKeyBits *f64 CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1372,7 +1372,7 @@ TlsCaKeyType *string CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1386,7 +1386,7 @@ TlsMinVersion *string Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretBackend.java.md b/docs/kmipSecretBackend.java.md index 1e765a0e..e1854476 100644 --- a/docs/kmipSecretBackend.java.md +++ b/docs/kmipSecretBackend.java.md @@ -4,7 +4,7 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers @@ -58,7 +58,7 @@ KmipSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultTlsClientTtl | java.lang.Number | Client certificate TTL in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listenAddrs | java.util.List | Addresses the KMIP server should listen on (host:port). | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | serverHostnames | java.util.List | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -206,7 +206,7 @@ If you experience problems setting this value it might not be settable. Please t Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -228,7 +228,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- @@ -786,7 +786,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1343,7 +1343,7 @@ KmipSecretBackendConfig.builder() | defaultTlsClientTtl | java.lang.Number | Client certificate TTL in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listenAddrs | java.util.List | Addresses the KMIP server should listen on (host:port). | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | serverHostnames | java.util.List | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1434,7 +1434,7 @@ public java.lang.String getPath(); Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1448,7 +1448,7 @@ public java.lang.Number getDefaultTlsClientKeyBits(); Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1462,7 +1462,7 @@ public java.lang.String getDefaultTlsClientKeyType(); Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1476,7 +1476,7 @@ public java.lang.Number getDefaultTlsClientTtl(); Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1490,7 +1490,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1504,7 +1504,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1516,7 +1516,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1533,7 +1533,7 @@ public java.util.List getListenAddrs(); Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1547,7 +1547,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1563,7 +1563,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1577,7 +1577,7 @@ public java.util.List getServerIps(); IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1591,7 +1591,7 @@ public java.lang.Number getTlsCaKeyBits(); CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1605,7 +1605,7 @@ public java.lang.String getTlsCaKeyType(); CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1619,7 +1619,7 @@ public java.lang.String getTlsMinVersion(); Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretBackend.python.md b/docs/kmipSecretBackend.python.md index a07b02c6..a81e1438 100644 --- a/docs/kmipSecretBackend.python.md +++ b/docs/kmipSecretBackend.python.md @@ -4,7 +4,7 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers @@ -55,7 +55,7 @@ kmipSecretBackend.KmipSecretBackend( | default_tls_client_ttl | typing.Union[int, float] | Client certificate TTL in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listen_addrs | typing.List[str] | Addresses the KMIP server should listen on (host:port). | | namespace | str | Target namespace. (requires Enterprise). | | server_hostnames | typing.List[str] | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -203,7 +203,7 @@ If you experience problems setting this value it might not be settable. Please t Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -225,7 +225,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- @@ -829,7 +829,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1381,7 +1381,7 @@ kmipSecretBackend.KmipSecretBackendConfig( | default_tls_client_ttl | typing.Union[int, float] | Client certificate TTL in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listen_addrs | typing.List[str] | Addresses the KMIP server should listen on (host:port). | | namespace | str | Target namespace. (requires Enterprise). | | server_hostnames | typing.List[str] | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1472,7 +1472,7 @@ path: str Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1486,7 +1486,7 @@ default_tls_client_key_bits: typing.Union[int, float] Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1500,7 +1500,7 @@ default_tls_client_key_type: str Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1514,7 +1514,7 @@ default_tls_client_ttl: typing.Union[int, float] Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1528,7 +1528,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1542,7 +1542,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1554,7 +1554,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1571,7 +1571,7 @@ listen_addrs: typing.List[str] Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1585,7 +1585,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1601,7 +1601,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1615,7 +1615,7 @@ server_ips: typing.List[str] IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1629,7 +1629,7 @@ tls_ca_key_bits: typing.Union[int, float] CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1643,7 +1643,7 @@ tls_ca_key_type: str CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1657,7 +1657,7 @@ tls_min_version: str Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretBackend.typescript.md b/docs/kmipSecretBackend.typescript.md index 79ed1036..71df1369 100644 --- a/docs/kmipSecretBackend.typescript.md +++ b/docs/kmipSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1088,7 +1088,7 @@ const kmipSecretBackendConfig: kmipSecretBackend.KmipSecretBackendConfig = { ... | defaultTlsClientTtl | number | Client certificate TTL in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listenAddrs | string[] | Addresses the KMIP server should listen on (host:port). | | namespace | string | Target namespace. (requires Enterprise). | | serverHostnames | string[] | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1179,7 +1179,7 @@ public readonly path: string; Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1193,7 +1193,7 @@ public readonly defaultTlsClientKeyBits: number; Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1207,7 +1207,7 @@ public readonly defaultTlsClientKeyType: string; Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1221,7 +1221,7 @@ public readonly defaultTlsClientTtl: number; Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1235,7 +1235,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1249,7 +1249,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1261,7 +1261,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1278,7 +1278,7 @@ public readonly listenAddrs: string[]; Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1292,7 +1292,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1308,7 +1308,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1322,7 +1322,7 @@ public readonly serverIps: string[]; IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1336,7 +1336,7 @@ public readonly tlsCaKeyBits: number; CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1350,7 +1350,7 @@ public readonly tlsCaKeyType: string; CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1364,7 +1364,7 @@ public readonly tlsMinVersion: string; Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretRole.csharp.md b/docs/kmipSecretRole.csharp.md index 78debd78..c7013a8e 100644 --- a/docs/kmipSecretRole.csharp.md +++ b/docs/kmipSecretRole.csharp.md @@ -4,7 +4,7 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers @@ -600,7 +600,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1333,7 +1333,7 @@ new KmipSecretRoleConfig { | Path | string | Path where KMIP backend is mounted. | | Role | string | Name of the role. | | Scope | string | Name of the scope. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | OperationActivate | object | Grant permission to use the KMIP Activate operation. | | OperationAddAttribute | object | Grant permission to use the KMIP Add Attribute operation. | @@ -1435,7 +1435,7 @@ public string Path { get; set; } Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1449,7 +1449,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1463,7 +1463,7 @@ public string Scope { get; set; } Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1475,7 +1475,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1492,7 +1492,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1506,7 +1506,7 @@ public object OperationActivate { get; set; } Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1520,7 +1520,7 @@ public object OperationAddAttribute { get; set; } Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1534,7 +1534,7 @@ public object OperationAll { get; set; } Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1548,7 +1548,7 @@ public object OperationCreate { get; set; } Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1562,7 +1562,7 @@ public object OperationDestroy { get; set; } Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1576,7 +1576,7 @@ public object OperationDiscoverVersions { get; set; } Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1590,7 +1590,7 @@ public object OperationGet { get; set; } Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1604,7 +1604,7 @@ public object OperationGetAttributeList { get; set; } Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1618,7 +1618,7 @@ public object OperationGetAttributes { get; set; } Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1632,7 +1632,7 @@ public object OperationLocate { get; set; } Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -1646,7 +1646,7 @@ public object OperationNone { get; set; } Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -1660,7 +1660,7 @@ public object OperationRegister { get; set; } Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -1674,7 +1674,7 @@ public object OperationRekey { get; set; } Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -1688,7 +1688,7 @@ public object OperationRevoke { get; set; } Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -1702,7 +1702,7 @@ public double TlsClientKeyBits { get; set; } Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -1716,7 +1716,7 @@ public string TlsClientKeyType { get; set; } Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -1730,7 +1730,7 @@ public double TlsClientTtl { get; set; } Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretRole.go.md b/docs/kmipSecretRole.go.md index bccf701b..f959960e 100644 --- a/docs/kmipSecretRole.go.md +++ b/docs/kmipSecretRole.go.md @@ -4,12 +4,12 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretrole" kmipsecretrole.NewKmipSecretRole(scope Construct, id *string, config KmipSecretRoleConfig) KmipSecretRole ``` @@ -511,7 +511,7 @@ func ResetTlsClientTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretrole" kmipsecretrole.KmipSecretRole_IsConstruct(x interface{}) *bool ``` @@ -543,7 +543,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretrole" kmipsecretrole.KmipSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -557,7 +557,7 @@ kmipsecretrole.KmipSecretRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretrole" kmipsecretrole.KmipSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -571,7 +571,7 @@ kmipsecretrole.KmipSecretRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretrole" kmipsecretrole.KmipSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -600,7 +600,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1284,7 +1284,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretrole" &kmipsecretrole.KmipSecretRoleConfig { Connection: interface{}, @@ -1333,7 +1333,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretrole" | Path | *string | Path where KMIP backend is mounted. | | Role | *string | Name of the role. | | Scope | *string | Name of the scope. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | OperationActivate | interface{} | Grant permission to use the KMIP Activate operation. | | OperationAddAttribute | interface{} | Grant permission to use the KMIP Add Attribute operation. | @@ -1435,7 +1435,7 @@ Path *string Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1449,7 +1449,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1463,7 +1463,7 @@ Scope *string Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1475,7 +1475,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1492,7 +1492,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1506,7 +1506,7 @@ OperationActivate interface{} Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1520,7 +1520,7 @@ OperationAddAttribute interface{} Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1534,7 +1534,7 @@ OperationAll interface{} Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1548,7 +1548,7 @@ OperationCreate interface{} Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1562,7 +1562,7 @@ OperationDestroy interface{} Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1576,7 +1576,7 @@ OperationDiscoverVersions interface{} Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1590,7 +1590,7 @@ OperationGet interface{} Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1604,7 +1604,7 @@ OperationGetAttributeList interface{} Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1618,7 +1618,7 @@ OperationGetAttributes interface{} Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1632,7 +1632,7 @@ OperationLocate interface{} Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -1646,7 +1646,7 @@ OperationNone interface{} Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -1660,7 +1660,7 @@ OperationRegister interface{} Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -1674,7 +1674,7 @@ OperationRekey interface{} Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -1688,7 +1688,7 @@ OperationRevoke interface{} Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -1702,7 +1702,7 @@ TlsClientKeyBits *f64 Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -1716,7 +1716,7 @@ TlsClientKeyType *string Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -1730,7 +1730,7 @@ TlsClientTtl *f64 Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretRole.java.md b/docs/kmipSecretRole.java.md index 3141466d..0c3e1d0e 100644 --- a/docs/kmipSecretRole.java.md +++ b/docs/kmipSecretRole.java.md @@ -4,7 +4,7 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers @@ -76,7 +76,7 @@ KmipSecretRole.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Path where KMIP backend is mounted. | | role | java.lang.String | Name of the role. | | scope | java.lang.String | Name of the scope. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | operationActivate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Grant permission to use the KMIP Activate operation. | | operationAddAttribute | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Grant permission to use the KMIP Add Attribute operation. | @@ -164,7 +164,7 @@ Must be unique amongst siblings in the same scope Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -205,7 +205,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -305,7 +305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -325,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -335,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -345,7 +345,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -355,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- @@ -935,7 +935,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1686,7 +1686,7 @@ KmipSecretRoleConfig.builder() | path | java.lang.String | Path where KMIP backend is mounted. | | role | java.lang.String | Name of the role. | | scope | java.lang.String | Name of the scope. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | operationActivate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Grant permission to use the KMIP Activate operation. | | operationAddAttribute | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Grant permission to use the KMIP Add Attribute operation. | @@ -1788,7 +1788,7 @@ public java.lang.String getPath(); Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1802,7 +1802,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1816,7 +1816,7 @@ public java.lang.String getScope(); Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1828,7 +1828,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1845,7 +1845,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1859,7 +1859,7 @@ public java.lang.Object getOperationActivate(); Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1873,7 +1873,7 @@ public java.lang.Object getOperationAddAttribute(); Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1887,7 +1887,7 @@ public java.lang.Object getOperationAll(); Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1901,7 +1901,7 @@ public java.lang.Object getOperationCreate(); Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1915,7 +1915,7 @@ public java.lang.Object getOperationDestroy(); Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1929,7 +1929,7 @@ public java.lang.Object getOperationDiscoverVersions(); Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1943,7 +1943,7 @@ public java.lang.Object getOperationGet(); Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1957,7 +1957,7 @@ public java.lang.Object getOperationGetAttributeList(); Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1971,7 +1971,7 @@ public java.lang.Object getOperationGetAttributes(); Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1985,7 +1985,7 @@ public java.lang.Object getOperationLocate(); Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -1999,7 +1999,7 @@ public java.lang.Object getOperationNone(); Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -2013,7 +2013,7 @@ public java.lang.Object getOperationRegister(); Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -2027,7 +2027,7 @@ public java.lang.Object getOperationRekey(); Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -2041,7 +2041,7 @@ public java.lang.Object getOperationRevoke(); Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -2055,7 +2055,7 @@ public java.lang.Number getTlsClientKeyBits(); Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -2069,7 +2069,7 @@ public java.lang.String getTlsClientKeyType(); Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -2083,7 +2083,7 @@ public java.lang.Number getTlsClientTtl(); Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretRole.python.md b/docs/kmipSecretRole.python.md index e8a68646..55bdac02 100644 --- a/docs/kmipSecretRole.python.md +++ b/docs/kmipSecretRole.python.md @@ -4,7 +4,7 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers @@ -60,7 +60,7 @@ kmipSecretRole.KmipSecretRole( | path | str | Path where KMIP backend is mounted. | | role | str | Name of the role. | | scope | str | Name of the scope. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | operation_activate | typing.Union[bool, cdktf.IResolvable] | Grant permission to use the KMIP Activate operation. | | operation_add_attribute | typing.Union[bool, cdktf.IResolvable] | Grant permission to use the KMIP Add Attribute operation. | @@ -148,7 +148,7 @@ Must be unique amongst siblings in the same scope Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -189,7 +189,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -269,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -299,7 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -309,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -319,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -349,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- @@ -965,7 +965,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1698,7 +1698,7 @@ kmipSecretRole.KmipSecretRoleConfig( | path | str | Path where KMIP backend is mounted. | | role | str | Name of the role. | | scope | str | Name of the scope. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | operation_activate | typing.Union[bool, cdktf.IResolvable] | Grant permission to use the KMIP Activate operation. | | operation_add_attribute | typing.Union[bool, cdktf.IResolvable] | Grant permission to use the KMIP Add Attribute operation. | @@ -1800,7 +1800,7 @@ path: str Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1814,7 +1814,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1828,7 +1828,7 @@ scope: str Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1840,7 +1840,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1857,7 +1857,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1871,7 +1871,7 @@ operation_activate: typing.Union[bool, IResolvable] Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1885,7 +1885,7 @@ operation_add_attribute: typing.Union[bool, IResolvable] Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1899,7 +1899,7 @@ operation_all: typing.Union[bool, IResolvable] Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1913,7 +1913,7 @@ operation_create: typing.Union[bool, IResolvable] Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1927,7 +1927,7 @@ operation_destroy: typing.Union[bool, IResolvable] Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1941,7 +1941,7 @@ operation_discover_versions: typing.Union[bool, IResolvable] Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1955,7 +1955,7 @@ operation_get: typing.Union[bool, IResolvable] Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1969,7 +1969,7 @@ operation_get_attribute_list: typing.Union[bool, IResolvable] Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1983,7 +1983,7 @@ operation_get_attributes: typing.Union[bool, IResolvable] Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1997,7 +1997,7 @@ operation_locate: typing.Union[bool, IResolvable] Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -2011,7 +2011,7 @@ operation_none: typing.Union[bool, IResolvable] Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -2025,7 +2025,7 @@ operation_register: typing.Union[bool, IResolvable] Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -2039,7 +2039,7 @@ operation_rekey: typing.Union[bool, IResolvable] Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -2053,7 +2053,7 @@ operation_revoke: typing.Union[bool, IResolvable] Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -2067,7 +2067,7 @@ tls_client_key_bits: typing.Union[int, float] Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -2081,7 +2081,7 @@ tls_client_key_type: str Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -2095,7 +2095,7 @@ tls_client_ttl: typing.Union[int, float] Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretRole.typescript.md b/docs/kmipSecretRole.typescript.md index b1af0826..fd9902f4 100644 --- a/docs/kmipSecretRole.typescript.md +++ b/docs/kmipSecretRole.typescript.md @@ -4,7 +4,7 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers @@ -600,7 +600,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1303,7 +1303,7 @@ const kmipSecretRoleConfig: kmipSecretRole.KmipSecretRoleConfig = { ... } | path | string | Path where KMIP backend is mounted. | | role | string | Name of the role. | | scope | string | Name of the scope. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | operationActivate | boolean \| cdktf.IResolvable | Grant permission to use the KMIP Activate operation. | | operationAddAttribute | boolean \| cdktf.IResolvable | Grant permission to use the KMIP Add Attribute operation. | @@ -1405,7 +1405,7 @@ public readonly path: string; Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1419,7 +1419,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1433,7 +1433,7 @@ public readonly scope: string; Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1445,7 +1445,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1462,7 +1462,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1476,7 +1476,7 @@ public readonly operationActivate: boolean | IResolvable; Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1490,7 +1490,7 @@ public readonly operationAddAttribute: boolean | IResolvable; Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1504,7 +1504,7 @@ public readonly operationAll: boolean | IResolvable; Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1518,7 +1518,7 @@ public readonly operationCreate: boolean | IResolvable; Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1532,7 +1532,7 @@ public readonly operationDestroy: boolean | IResolvable; Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1546,7 +1546,7 @@ public readonly operationDiscoverVersions: boolean | IResolvable; Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1560,7 +1560,7 @@ public readonly operationGet: boolean | IResolvable; Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1574,7 +1574,7 @@ public readonly operationGetAttributeList: boolean | IResolvable; Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1588,7 +1588,7 @@ public readonly operationGetAttributes: boolean | IResolvable; Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1602,7 +1602,7 @@ public readonly operationLocate: boolean | IResolvable; Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -1616,7 +1616,7 @@ public readonly operationNone: boolean | IResolvable; Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -1630,7 +1630,7 @@ public readonly operationRegister: boolean | IResolvable; Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -1644,7 +1644,7 @@ public readonly operationRekey: boolean | IResolvable; Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -1658,7 +1658,7 @@ public readonly operationRevoke: boolean | IResolvable; Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -1672,7 +1672,7 @@ public readonly tlsClientKeyBits: number; Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -1686,7 +1686,7 @@ public readonly tlsClientKeyType: string; Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -1700,7 +1700,7 @@ public readonly tlsClientTtl: number; Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretScope.csharp.md b/docs/kmipSecretScope.csharp.md index b8063683..ac5c4f00 100644 --- a/docs/kmipSecretScope.csharp.md +++ b/docs/kmipSecretScope.csharp.md @@ -4,7 +4,7 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ new KmipSecretScopeConfig { | Path | string | Path where KMIP backend is mounted. | | Scope | string | Name of the scope. | | Force | object | Force deletion even if there are managed objects in the scope. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ public string Path { get; set; } Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -929,7 +929,7 @@ public string Scope { get; set; } Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -943,7 +943,7 @@ public object Force { get; set; } Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -955,7 +955,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kmipSecretScope.go.md b/docs/kmipSecretScope.go.md index 45507b77..bef5bc34 100644 --- a/docs/kmipSecretScope.go.md +++ b/docs/kmipSecretScope.go.md @@ -4,12 +4,12 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretscope" kmipsecretscope.NewKmipSecretScope(scope Construct, id *string, config KmipSecretScopeConfig) KmipSecretScope ``` @@ -399,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretscope" kmipsecretscope.KmipSecretScope_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretscope" kmipsecretscope.KmipSecretScope_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ kmipsecretscope.KmipSecretScope_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretscope" kmipsecretscope.KmipSecretScope_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ kmipsecretscope.KmipSecretScope_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretscope" kmipsecretscope.KmipSecretScope_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -798,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretscope" &kmipsecretscope.KmipSecretScopeConfig { Connection: interface{}, @@ -830,7 +830,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kmipsecretscope" | Path | *string | Path where KMIP backend is mounted. | | Scope | *string | Name of the scope. | | Force | interface{} | Force deletion even if there are managed objects in the scope. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ Path *string Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -929,7 +929,7 @@ Scope *string Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -943,7 +943,7 @@ Force interface{} Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -955,7 +955,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kmipSecretScope.java.md b/docs/kmipSecretScope.java.md index d5330578..d44404ab 100644 --- a/docs/kmipSecretScope.java.md +++ b/docs/kmipSecretScope.java.md @@ -4,7 +4,7 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers @@ -46,7 +46,7 @@ KmipSecretScope.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Path where KMIP backend is mounted. | | scope | java.lang.String | Name of the scope. | | force | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Force deletion even if there are managed objects in the scope. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -158,7 +158,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- @@ -606,7 +606,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -953,7 +953,7 @@ KmipSecretScopeConfig.builder() | path | java.lang.String | Path where KMIP backend is mounted. | | scope | java.lang.String | Name of the scope. | | force | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Force deletion even if there are managed objects in the scope. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1038,7 +1038,7 @@ public java.lang.String getPath(); Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -1052,7 +1052,7 @@ public java.lang.String getScope(); Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -1066,7 +1066,7 @@ public java.lang.Object getForce(); Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -1078,7 +1078,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1095,7 +1095,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kmipSecretScope.python.md b/docs/kmipSecretScope.python.md index dd86bfb6..ec157965 100644 --- a/docs/kmipSecretScope.python.md +++ b/docs/kmipSecretScope.python.md @@ -4,7 +4,7 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers @@ -43,7 +43,7 @@ kmipSecretScope.KmipSecretScope( | path | str | Path where KMIP backend is mounted. | | scope | str | Name of the scope. | | force | typing.Union[bool, cdktf.IResolvable] | Force deletion even if there are managed objects in the scope. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -991,7 +991,7 @@ kmipSecretScope.KmipSecretScopeConfig( | path | str | Path where KMIP backend is mounted. | | scope | str | Name of the scope. | | force | typing.Union[bool, cdktf.IResolvable] | Force deletion even if there are managed objects in the scope. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1076,7 +1076,7 @@ path: str Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -1090,7 +1090,7 @@ scope: str Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -1104,7 +1104,7 @@ force: typing.Union[bool, IResolvable] Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -1116,7 +1116,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1133,7 +1133,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kmipSecretScope.typescript.md b/docs/kmipSecretScope.typescript.md index 280bcceb..39788861 100644 --- a/docs/kmipSecretScope.typescript.md +++ b/docs/kmipSecretScope.typescript.md @@ -4,7 +4,7 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -817,7 +817,7 @@ const kmipSecretScopeConfig: kmipSecretScope.KmipSecretScopeConfig = { ... } | path | string | Path where KMIP backend is mounted. | | scope | string | Name of the scope. | | force | boolean \| cdktf.IResolvable | Force deletion even if there are managed objects in the scope. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -902,7 +902,7 @@ public readonly path: string; Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -916,7 +916,7 @@ public readonly scope: string; Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -930,7 +930,7 @@ public readonly force: boolean | IResolvable; Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -942,7 +942,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -959,7 +959,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kubernetesAuthBackendConfig.csharp.md b/docs/kubernetesAuthBackendConfig.csharp.md index 2baba800..faf2c9f4 100644 --- a/docs/kubernetesAuthBackendConfig.csharp.md +++ b/docs/kubernetesAuthBackendConfig.csharp.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -988,7 +988,7 @@ new KubernetesAuthBackendConfigConfig { | Backend | string | Unique name of the kubernetes backend to configure. | | DisableIssValidation | object | Optional disable JWT issuer validation. Allows to skip ISS validation. | | DisableLocalCaJwt | object | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | Issuer | string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | KubernetesCaCert | string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1077,7 +1077,7 @@ public string KubernetesHost { get; set; } Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1091,7 +1091,7 @@ public string Backend { get; set; } Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1105,7 +1105,7 @@ public object DisableIssValidation { get; set; } Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1119,7 +1119,7 @@ public object DisableLocalCaJwt { get; set; } Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1131,7 +1131,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1148,7 +1148,7 @@ public string Issuer { get; set; } Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1162,7 +1162,7 @@ public string KubernetesCaCert { get; set; } PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1176,7 +1176,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1192,7 +1192,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1208,7 +1208,7 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} --- diff --git a/docs/kubernetesAuthBackendConfig.go.md b/docs/kubernetesAuthBackendConfig.go.md index 90adfe75..7c30a3f6 100644 --- a/docs/kubernetesAuthBackendConfig.go.md +++ b/docs/kubernetesAuthBackendConfig.go.md @@ -4,12 +4,12 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendconfig" kubernetesauthbackendconfig.NewKubernetesAuthBackendConfig(scope Construct, id *string, config KubernetesAuthBackendConfigConfig) KubernetesAuthBackendConfig ``` @@ -441,7 +441,7 @@ func ResetTokenReviewerJwt() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendconfig" kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsConstruct(x interface{}) *bool ``` @@ -473,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendconfig" kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +487,7 @@ kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendconfig" kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +501,7 @@ kubernetesauthbackendconfig.KubernetesAuthBackendConfig_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendconfig" kubernetesauthbackendconfig.KubernetesAuthBackendConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -530,7 +530,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -950,7 +950,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendconfig" &kubernetesauthbackendconfig.KubernetesAuthBackendConfigConfig { Connection: interface{}, @@ -988,7 +988,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackend | Backend | *string | Unique name of the kubernetes backend to configure. | | DisableIssValidation | interface{} | Optional disable JWT issuer validation. Allows to skip ISS validation. | | DisableLocalCaJwt | interface{} | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | Issuer | *string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | KubernetesCaCert | *string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1077,7 +1077,7 @@ KubernetesHost *string Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1091,7 +1091,7 @@ Backend *string Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1105,7 +1105,7 @@ DisableIssValidation interface{} Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1119,7 +1119,7 @@ DisableLocalCaJwt interface{} Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1131,7 +1131,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1148,7 +1148,7 @@ Issuer *string Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1162,7 +1162,7 @@ KubernetesCaCert *string PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1176,7 +1176,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1192,7 +1192,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1208,7 +1208,7 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} --- diff --git a/docs/kubernetesAuthBackendConfig.java.md b/docs/kubernetesAuthBackendConfig.java.md index 75048786..5a0cb0f5 100644 --- a/docs/kubernetesAuthBackendConfig.java.md +++ b/docs/kubernetesAuthBackendConfig.java.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -53,7 +53,7 @@ KubernetesAuthBackendConfig.Builder.create(Construct scope, java.lang.String id) | backend | java.lang.String | Unique name of the kubernetes backend to configure. | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | java.lang.String | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | java.lang.String | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -211,7 +211,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -223,7 +223,7 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} --- @@ -713,7 +713,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -1177,7 +1177,7 @@ KubernetesAuthBackendConfigConfig.builder() | backend | java.lang.String | Unique name of the kubernetes backend to configure. | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | java.lang.String | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | java.lang.String | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1266,7 +1266,7 @@ public java.lang.String getKubernetesHost(); Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1280,7 +1280,7 @@ public java.lang.String getBackend(); Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1294,7 +1294,7 @@ public java.lang.Object getDisableIssValidation(); Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1308,7 +1308,7 @@ public java.lang.Object getDisableLocalCaJwt(); Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1320,7 +1320,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1337,7 +1337,7 @@ public java.lang.String getIssuer(); Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1351,7 +1351,7 @@ public java.lang.String getKubernetesCaCert(); PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1365,7 +1365,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1381,7 +1381,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1397,7 +1397,7 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} --- diff --git a/docs/kubernetesAuthBackendConfig.python.md b/docs/kubernetesAuthBackendConfig.python.md index 51f9cf9f..fe2d9973 100644 --- a/docs/kubernetesAuthBackendConfig.python.md +++ b/docs/kubernetesAuthBackendConfig.python.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -49,7 +49,7 @@ kubernetesAuthBackendConfig.KubernetesAuthBackendConfig( | backend | str | Unique name of the kubernetes backend to configure. | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | str | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetes_ca_cert | str | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | str | Target namespace. (requires Enterprise). | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -175,7 +175,7 @@ If you experience problems setting this value it might not be settable. Please t Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -207,7 +207,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -219,7 +219,7 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} --- @@ -755,7 +755,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -1213,7 +1213,7 @@ kubernetesAuthBackendConfig.KubernetesAuthBackendConfigConfig( | backend | str | Unique name of the kubernetes backend to configure. | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | str | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetes_ca_cert | str | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1302,7 +1302,7 @@ kubernetes_host: str Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1316,7 +1316,7 @@ backend: str Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1330,7 +1330,7 @@ disable_iss_validation: typing.Union[bool, IResolvable] Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1344,7 +1344,7 @@ disable_local_ca_jwt: typing.Union[bool, IResolvable] Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1356,7 +1356,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1373,7 +1373,7 @@ issuer: str Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1387,7 +1387,7 @@ kubernetes_ca_cert: str PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1401,7 +1401,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1417,7 +1417,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1433,7 +1433,7 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} --- diff --git a/docs/kubernetesAuthBackendConfig.typescript.md b/docs/kubernetesAuthBackendConfig.typescript.md index b62cdf51..22ee34ef 100644 --- a/docs/kubernetesAuthBackendConfig.typescript.md +++ b/docs/kubernetesAuthBackendConfig.typescript.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -970,7 +970,7 @@ const kubernetesAuthBackendConfigConfig: kubernetesAuthBackendConfig.KubernetesA | backend | string | Unique name of the kubernetes backend to configure. | | disableIssValidation | boolean \| cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | boolean \| cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1059,7 +1059,7 @@ public readonly kubernetesHost: string; Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1073,7 +1073,7 @@ public readonly backend: string; Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1087,7 +1087,7 @@ public readonly disableIssValidation: boolean | IResolvable; Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1101,7 +1101,7 @@ public readonly disableLocalCaJwt: boolean | IResolvable; Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1113,7 +1113,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1130,7 +1130,7 @@ public readonly issuer: string; Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1144,7 +1144,7 @@ public readonly kubernetesCaCert: string; PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1158,7 +1158,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1174,7 +1174,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1190,7 +1190,7 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} --- diff --git a/docs/kubernetesAuthBackendRole.csharp.md b/docs/kubernetesAuthBackendRole.csharp.md index 9279640c..9fd7f516 100644 --- a/docs/kubernetesAuthBackendRole.csharp.md +++ b/docs/kubernetesAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1186,7 +1186,7 @@ new KubernetesAuthBackendRoleConfig { | AliasNameSource | string | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | Audience | string | Optional Audience claim to verify in the JWT. | | Backend | string | Unique name of the kubernetes backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1282,7 +1282,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1298,7 +1298,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1312,7 +1312,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1326,7 +1326,7 @@ public string AliasNameSource { get; set; } Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1340,7 +1340,7 @@ public string Audience { get; set; } Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1354,7 +1354,7 @@ public string Backend { get; set; } Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1366,7 +1366,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1383,7 +1383,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1397,7 +1397,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1411,7 +1411,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1425,7 +1425,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1439,7 +1439,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1453,7 +1453,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1467,7 +1467,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1481,7 +1481,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1495,7 +1495,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1509,7 +1509,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesAuthBackendRole.go.md b/docs/kubernetesAuthBackendRole.go.md index 55dde6a2..4a831745 100644 --- a/docs/kubernetesAuthBackendRole.go.md +++ b/docs/kubernetesAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendrole" kubernetesauthbackendrole.NewKubernetesAuthBackendRole(scope Construct, id *string, config KubernetesAuthBackendRoleConfig) KubernetesAuthBackendRole ``` @@ -476,7 +476,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendrole" kubernetesauthbackendrole.KubernetesAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -508,7 +508,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendrole" kubernetesauthbackendrole.KubernetesAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -522,7 +522,7 @@ kubernetesauthbackendrole.KubernetesAuthBackendRole_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendrole" kubernetesauthbackendrole.KubernetesAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -536,7 +536,7 @@ kubernetesauthbackendrole.KubernetesAuthBackendRole_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendrole" kubernetesauthbackendrole.KubernetesAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -565,7 +565,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1139,7 +1139,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackendrole" &kubernetesauthbackendrole.KubernetesAuthBackendRoleConfig { Connection: interface{}, @@ -1186,7 +1186,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetesauthbackend | AliasNameSource | *string | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | Audience | *string | Optional Audience claim to verify in the JWT. | | Backend | *string | Unique name of the kubernetes backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1282,7 +1282,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1298,7 +1298,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1312,7 +1312,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1326,7 +1326,7 @@ AliasNameSource *string Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1340,7 +1340,7 @@ Audience *string Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1354,7 +1354,7 @@ Backend *string Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1366,7 +1366,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1383,7 +1383,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1397,7 +1397,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1411,7 +1411,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1425,7 +1425,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1439,7 +1439,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1453,7 +1453,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1467,7 +1467,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1481,7 +1481,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1495,7 +1495,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1509,7 +1509,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesAuthBackendRole.java.md b/docs/kubernetesAuthBackendRole.java.md index a21a8325..b9a49685 100644 --- a/docs/kubernetesAuthBackendRole.java.md +++ b/docs/kubernetesAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -61,7 +61,7 @@ KubernetesAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | aliasNameSource | java.lang.String | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | java.lang.String | Optional Audience claim to verify in the JWT. | | backend | java.lang.String | Unique name of the kubernetes backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -143,7 +143,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -155,7 +155,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -216,7 +216,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- @@ -831,7 +831,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1457,7 +1457,7 @@ KubernetesAuthBackendRoleConfig.builder() | aliasNameSource | java.lang.String | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | java.lang.String | Optional Audience claim to verify in the JWT. | | backend | java.lang.String | Unique name of the kubernetes backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1553,7 +1553,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1569,7 +1569,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1583,7 +1583,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1597,7 +1597,7 @@ public java.lang.String getAliasNameSource(); Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1611,7 +1611,7 @@ public java.lang.String getAudience(); Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1625,7 +1625,7 @@ public java.lang.String getBackend(); Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1637,7 +1637,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1654,7 +1654,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1668,7 +1668,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1682,7 +1682,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1696,7 +1696,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1710,7 +1710,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1724,7 +1724,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1738,7 +1738,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1752,7 +1752,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1766,7 +1766,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1780,7 +1780,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesAuthBackendRole.python.md b/docs/kubernetesAuthBackendRole.python.md index 7d7272c0..7c22ebbe 100644 --- a/docs/kubernetesAuthBackendRole.python.md +++ b/docs/kubernetesAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -58,7 +58,7 @@ kubernetesAuthBackendRole.KubernetesAuthBackendRole( | alias_name_source | str | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | str | Optional Audience claim to verify in the JWT. | | backend | str | Unique name of the kubernetes backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -140,7 +140,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -152,7 +152,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -213,7 +213,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- @@ -874,7 +874,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1495,7 +1495,7 @@ kubernetesAuthBackendRole.KubernetesAuthBackendRoleConfig( | alias_name_source | str | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | str | Optional Audience claim to verify in the JWT. | | backend | str | Unique name of the kubernetes backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1591,7 +1591,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1607,7 +1607,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1621,7 +1621,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1635,7 +1635,7 @@ alias_name_source: str Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1649,7 +1649,7 @@ audience: str Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1663,7 +1663,7 @@ backend: str Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1675,7 +1675,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1692,7 +1692,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1706,7 +1706,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1720,7 +1720,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1734,7 +1734,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1748,7 +1748,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1762,7 +1762,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1776,7 +1776,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1790,7 +1790,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1804,7 +1804,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1818,7 +1818,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesAuthBackendRole.typescript.md b/docs/kubernetesAuthBackendRole.typescript.md index aa56bffe..8a8a4f25 100644 --- a/docs/kubernetesAuthBackendRole.typescript.md +++ b/docs/kubernetesAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1161,7 +1161,7 @@ const kubernetesAuthBackendRoleConfig: kubernetesAuthBackendRole.KubernetesAuthB | aliasNameSource | string | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | string | Optional Audience claim to verify in the JWT. | | backend | string | Unique name of the kubernetes backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1257,7 +1257,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1273,7 +1273,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1287,7 +1287,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1301,7 +1301,7 @@ public readonly aliasNameSource: string; Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1315,7 +1315,7 @@ public readonly audience: string; Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1329,7 +1329,7 @@ public readonly backend: string; Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1341,7 +1341,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1358,7 +1358,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1372,7 +1372,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1386,7 +1386,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1400,7 +1400,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1414,7 +1414,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1428,7 +1428,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1442,7 +1442,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1456,7 +1456,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1470,7 +1470,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1484,7 +1484,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesSecretBackend.csharp.md b/docs/kubernetesSecretBackend.csharp.md index ee089f08..39874ded 100644 --- a/docs/kubernetesSecretBackend.csharp.md +++ b/docs/kubernetesSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1213,7 +1213,7 @@ new KubernetesSecretBackendConfig { | Description | string | Human-friendly description of the mount. | | DisableLocalCaJwt | object | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | ExternalEntropyAccess | object | Enable the secrets engine to access Vault's external entropy source. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | KubernetesCaCert | string | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | KubernetesHost | string | The Kubernetes API URL to connect to. | | Local | object | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1305,7 +1305,7 @@ public string Path { get; set; } Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1319,7 +1319,7 @@ public string[] AllowedManagedKeys { get; set; } List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1333,7 +1333,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1347,7 +1347,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1361,7 +1361,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1375,7 +1375,7 @@ public string Description { get; set; } Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1389,7 +1389,7 @@ public object DisableLocalCaJwt { get; set; } Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1403,7 +1403,7 @@ public object ExternalEntropyAccess { get; set; } Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -1415,7 +1415,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1434,7 +1434,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -1448,7 +1448,7 @@ public string KubernetesHost { get; set; } The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -1462,7 +1462,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -1476,7 +1476,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -1490,7 +1490,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -1504,7 +1504,7 @@ public System.Collections.Generic.IDictionary Options { get; set Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -1518,7 +1518,7 @@ public object SealWrap { get; set; } Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -1534,7 +1534,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackend.go.md b/docs/kubernetesSecretBackend.go.md index d0fec0e5..52a3fffd 100644 --- a/docs/kubernetesSecretBackend.go.md +++ b/docs/kubernetesSecretBackend.go.md @@ -4,12 +4,12 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackend" kubernetessecretbackend.NewKubernetesSecretBackend(scope Construct, id *string, config KubernetesSecretBackendConfig) KubernetesSecretBackend ``` @@ -490,7 +490,7 @@ func ResetServiceAccountJwt() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackend" kubernetessecretbackend.KubernetesSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -522,7 +522,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackend" kubernetessecretbackend.KubernetesSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -536,7 +536,7 @@ kubernetessecretbackend.KubernetesSecretBackend_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackend" kubernetessecretbackend.KubernetesSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -550,7 +550,7 @@ kubernetessecretbackend.KubernetesSecretBackend_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackend" kubernetessecretbackend.KubernetesSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -579,7 +579,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1164,7 +1164,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackend" &kubernetessecretbackend.KubernetesSecretBackendConfig { Connection: interface{}, @@ -1213,7 +1213,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbacke | Description | *string | Human-friendly description of the mount. | | DisableLocalCaJwt | interface{} | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | ExternalEntropyAccess | interface{} | Enable the secrets engine to access Vault's external entropy source. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | KubernetesCaCert | *string | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | KubernetesHost | *string | The Kubernetes API URL to connect to. | | Local | interface{} | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1305,7 +1305,7 @@ Path *string Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1319,7 +1319,7 @@ AllowedManagedKeys *[]*string List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1333,7 +1333,7 @@ AuditNonHmacRequestKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1347,7 +1347,7 @@ AuditNonHmacResponseKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1361,7 +1361,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1375,7 +1375,7 @@ Description *string Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1389,7 +1389,7 @@ DisableLocalCaJwt interface{} Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1403,7 +1403,7 @@ ExternalEntropyAccess interface{} Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -1415,7 +1415,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1434,7 +1434,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -1448,7 +1448,7 @@ KubernetesHost *string The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -1462,7 +1462,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -1476,7 +1476,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -1490,7 +1490,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -1504,7 +1504,7 @@ Options *map[string]*string Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -1518,7 +1518,7 @@ SealWrap interface{} Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -1534,7 +1534,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackend.java.md b/docs/kubernetesSecretBackend.java.md index 188902a6..60bf3cc4 100644 --- a/docs/kubernetesSecretBackend.java.md +++ b/docs/kubernetesSecretBackend.java.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers @@ -66,7 +66,7 @@ KubernetesSecretBackend.Builder.create(Construct scope, java.lang.String id) | description | java.lang.String | Human-friendly description of the mount. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | kubernetesCaCert | java.lang.String | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetesHost | java.lang.String | The Kubernetes API URL to connect to. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -144,7 +144,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -237,7 +237,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -309,7 +309,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- @@ -848,7 +848,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1490,7 +1490,7 @@ KubernetesSecretBackendConfig.builder() | description | java.lang.String | Human-friendly description of the mount. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | kubernetesCaCert | java.lang.String | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetesHost | java.lang.String | The Kubernetes API URL to connect to. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1582,7 +1582,7 @@ public java.lang.String getPath(); Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1596,7 +1596,7 @@ public java.util.List getAllowedManagedKeys(); List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1610,7 +1610,7 @@ public java.util.List getAuditNonHmacRequestKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1624,7 +1624,7 @@ public java.util.List getAuditNonHmacResponseKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1638,7 +1638,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1652,7 +1652,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1666,7 +1666,7 @@ public java.lang.Object getDisableLocalCaJwt(); Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1680,7 +1680,7 @@ public java.lang.Object getExternalEntropyAccess(); Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -1692,7 +1692,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1711,7 +1711,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -1725,7 +1725,7 @@ public java.lang.String getKubernetesHost(); The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -1739,7 +1739,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -1753,7 +1753,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -1767,7 +1767,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -1781,7 +1781,7 @@ public java.util.Map getOptions(); Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -1795,7 +1795,7 @@ public java.lang.Object getSealWrap(); Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -1811,7 +1811,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackend.python.md b/docs/kubernetesSecretBackend.python.md index 9b41acf4..dada28b5 100644 --- a/docs/kubernetesSecretBackend.python.md +++ b/docs/kubernetesSecretBackend.python.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers @@ -60,7 +60,7 @@ kubernetesSecretBackend.KubernetesSecretBackend( | description | str | Human-friendly description of the mount. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | kubernetes_ca_cert | str | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetes_host | str | The Kubernetes API URL to connect to. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -138,7 +138,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -231,7 +231,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -303,7 +303,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- @@ -888,7 +888,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1522,7 +1522,7 @@ kubernetesSecretBackend.KubernetesSecretBackendConfig( | description | str | Human-friendly description of the mount. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | kubernetes_ca_cert | str | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetes_host | str | The Kubernetes API URL to connect to. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1614,7 +1614,7 @@ path: str Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1628,7 +1628,7 @@ allowed_managed_keys: typing.List[str] List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1642,7 +1642,7 @@ audit_non_hmac_request_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1656,7 +1656,7 @@ audit_non_hmac_response_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1670,7 +1670,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1684,7 +1684,7 @@ description: str Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1698,7 +1698,7 @@ disable_local_ca_jwt: typing.Union[bool, IResolvable] Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1712,7 +1712,7 @@ external_entropy_access: typing.Union[bool, IResolvable] Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -1724,7 +1724,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1743,7 +1743,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -1757,7 +1757,7 @@ kubernetes_host: str The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -1771,7 +1771,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -1785,7 +1785,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -1799,7 +1799,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -1813,7 +1813,7 @@ options: typing.Mapping[str] Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -1827,7 +1827,7 @@ seal_wrap: typing.Union[bool, IResolvable] Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -1843,7 +1843,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackend.typescript.md b/docs/kubernetesSecretBackend.typescript.md index 2827281b..6c095faf 100644 --- a/docs/kubernetesSecretBackend.typescript.md +++ b/docs/kubernetesSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1188,7 +1188,7 @@ const kubernetesSecretBackendConfig: kubernetesSecretBackend.KubernetesSecretBac | description | string | Human-friendly description of the mount. | | disableLocalCaJwt | boolean \| cdktf.IResolvable | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | externalEntropyAccess | boolean \| cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | kubernetesCaCert | string | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetesHost | string | The Kubernetes API URL to connect to. | | local | boolean \| cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1280,7 +1280,7 @@ public readonly path: string; Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1294,7 +1294,7 @@ public readonly allowedManagedKeys: string[]; List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1308,7 +1308,7 @@ public readonly auditNonHmacRequestKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1322,7 +1322,7 @@ public readonly auditNonHmacResponseKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1336,7 +1336,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1350,7 +1350,7 @@ public readonly description: string; Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1364,7 +1364,7 @@ public readonly disableLocalCaJwt: boolean | IResolvable; Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1378,7 +1378,7 @@ public readonly externalEntropyAccess: boolean | IResolvable; Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -1390,7 +1390,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1409,7 +1409,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -1423,7 +1423,7 @@ public readonly kubernetesHost: string; The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -1437,7 +1437,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -1451,7 +1451,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -1465,7 +1465,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -1479,7 +1479,7 @@ public readonly options: {[ key: string ]: string}; Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -1493,7 +1493,7 @@ public readonly sealWrap: boolean | IResolvable; Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -1509,7 +1509,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackendRole.csharp.md b/docs/kubernetesSecretBackendRole.csharp.md index c2f447f6..ec6df57a 100644 --- a/docs/kubernetesSecretBackendRole.csharp.md +++ b/docs/kubernetesSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1096,7 +1096,7 @@ new KubernetesSecretBackendRoleConfig { | ExtraAnnotations | System.Collections.Generic.IDictionary | Additional annotations to apply to all generated Kubernetes objects. | | ExtraLabels | System.Collections.Generic.IDictionary | Additional labels to apply to all generated Kubernetes objects. | | GeneratedRoleRules | string | The Role or ClusterRole rules to use when generating a role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | KubernetesRoleName | string | The pre-existing Role or ClusterRole to bind a generated service account to. | | KubernetesRoleType | string | Specifies whether the Kubernetes role is a Role or ClusterRole. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1187,7 +1187,7 @@ public string[] AllowedKubernetesNamespaces { get; set; } The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1201,7 +1201,7 @@ public string Backend { get; set; } The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1215,7 +1215,7 @@ public string Name { get; set; } The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1229,7 +1229,7 @@ public System.Collections.Generic.IDictionary ExtraAnnotations { Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1243,7 +1243,7 @@ public System.Collections.Generic.IDictionary ExtraLabels { get; Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1259,7 +1259,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1271,7 +1271,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1290,7 +1290,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1304,7 +1304,7 @@ public string KubernetesRoleType { get; set; } Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1318,7 +1318,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1334,7 +1334,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1350,7 +1350,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1364,7 +1364,7 @@ public double TokenDefaultTtl { get; set; } The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1378,7 +1378,7 @@ public double TokenMaxTtl { get; set; } The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kubernetesSecretBackendRole.go.md b/docs/kubernetesSecretBackendRole.go.md index 8127a68c..baa51e8a 100644 --- a/docs/kubernetesSecretBackendRole.go.md +++ b/docs/kubernetesSecretBackendRole.go.md @@ -4,12 +4,12 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackendrole" kubernetessecretbackendrole.NewKubernetesSecretBackendRole(scope Construct, id *string, config KubernetesSecretBackendRoleConfig) KubernetesSecretBackendRole ``` @@ -455,7 +455,7 @@ func ResetTokenMaxTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackendrole" kubernetessecretbackendrole.KubernetesSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -487,7 +487,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackendrole" kubernetessecretbackendrole.KubernetesSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -501,7 +501,7 @@ kubernetessecretbackendrole.KubernetesSecretBackendRole_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackendrole" kubernetessecretbackendrole.KubernetesSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -515,7 +515,7 @@ kubernetessecretbackendrole.KubernetesSecretBackendRole_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackendrole" kubernetessecretbackendrole.KubernetesSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -544,7 +544,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1052,7 +1052,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbackendrole" &kubernetessecretbackendrole.KubernetesSecretBackendRoleConfig { Connection: interface{}, @@ -1096,7 +1096,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kubernetessecretbacke | ExtraAnnotations | *map[string]*string | Additional annotations to apply to all generated Kubernetes objects. | | ExtraLabels | *map[string]*string | Additional labels to apply to all generated Kubernetes objects. | | GeneratedRoleRules | *string | The Role or ClusterRole rules to use when generating a role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | KubernetesRoleName | *string | The pre-existing Role or ClusterRole to bind a generated service account to. | | KubernetesRoleType | *string | Specifies whether the Kubernetes role is a Role or ClusterRole. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1187,7 +1187,7 @@ AllowedKubernetesNamespaces *[]*string The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1201,7 +1201,7 @@ Backend *string The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1215,7 +1215,7 @@ Name *string The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1229,7 +1229,7 @@ ExtraAnnotations *map[string]*string Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1243,7 +1243,7 @@ ExtraLabels *map[string]*string Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1259,7 +1259,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1271,7 +1271,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1290,7 +1290,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1304,7 +1304,7 @@ KubernetesRoleType *string Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1318,7 +1318,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1334,7 +1334,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1350,7 +1350,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1364,7 +1364,7 @@ TokenDefaultTtl *f64 The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1378,7 +1378,7 @@ TokenMaxTtl *f64 The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kubernetesSecretBackendRole.java.md b/docs/kubernetesSecretBackendRole.java.md index ef6551e3..ac45b524 100644 --- a/docs/kubernetesSecretBackendRole.java.md +++ b/docs/kubernetesSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers @@ -57,7 +57,7 @@ KubernetesSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | extraAnnotations | java.util.Map | Additional annotations to apply to all generated Kubernetes objects. | | extraLabels | java.util.Map | Additional labels to apply to all generated Kubernetes objects. | | generatedRoleRules | java.lang.String | The Role or ClusterRole rules to use when generating a role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetesRoleName | java.lang.String | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetesRoleType | java.lang.String | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -186,7 +186,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -209,7 +209,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -241,7 +241,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -253,7 +253,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- @@ -777,7 +777,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1333,7 +1333,7 @@ KubernetesSecretBackendRoleConfig.builder() | extraAnnotations | java.util.Map | Additional annotations to apply to all generated Kubernetes objects. | | extraLabels | java.util.Map | Additional labels to apply to all generated Kubernetes objects. | | generatedRoleRules | java.lang.String | The Role or ClusterRole rules to use when generating a role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetesRoleName | java.lang.String | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetesRoleType | java.lang.String | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1424,7 +1424,7 @@ public java.util.List getAllowedKubernetesNamespaces(); The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1438,7 +1438,7 @@ public java.lang.String getBackend(); The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1452,7 +1452,7 @@ public java.lang.String getName(); The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1466,7 +1466,7 @@ public java.util.Map getExtraAnnotations(); Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1480,7 +1480,7 @@ public java.util.Map getExtraLabels(); Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1496,7 +1496,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1508,7 +1508,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1527,7 +1527,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1541,7 +1541,7 @@ public java.lang.String getKubernetesRoleType(); Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1555,7 +1555,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1571,7 +1571,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1587,7 +1587,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1601,7 +1601,7 @@ public java.lang.Number getTokenDefaultTtl(); The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1615,7 +1615,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kubernetesSecretBackendRole.python.md b/docs/kubernetesSecretBackendRole.python.md index 4c87ac6d..3e1be9c9 100644 --- a/docs/kubernetesSecretBackendRole.python.md +++ b/docs/kubernetesSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers @@ -55,7 +55,7 @@ kubernetesSecretBackendRole.KubernetesSecretBackendRole( | extra_annotations | typing.Mapping[str] | Additional annotations to apply to all generated Kubernetes objects. | | extra_labels | typing.Mapping[str] | Additional labels to apply to all generated Kubernetes objects. | | generated_role_rules | str | The Role or ClusterRole rules to use when generating a role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetes_role_name | str | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetes_role_type | str | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | str | Target namespace. (requires Enterprise). | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -184,7 +184,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -207,7 +207,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -239,7 +239,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -251,7 +251,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- @@ -821,7 +821,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1373,7 +1373,7 @@ kubernetesSecretBackendRole.KubernetesSecretBackendRoleConfig( | extra_annotations | typing.Mapping[str] | Additional annotations to apply to all generated Kubernetes objects. | | extra_labels | typing.Mapping[str] | Additional labels to apply to all generated Kubernetes objects. | | generated_role_rules | str | The Role or ClusterRole rules to use when generating a role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetes_role_name | str | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetes_role_type | str | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1464,7 +1464,7 @@ allowed_kubernetes_namespaces: typing.List[str] The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1478,7 +1478,7 @@ backend: str The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1492,7 +1492,7 @@ name: str The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1506,7 +1506,7 @@ extra_annotations: typing.Mapping[str] Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1520,7 +1520,7 @@ extra_labels: typing.Mapping[str] Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1536,7 +1536,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1548,7 +1548,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1567,7 +1567,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1581,7 +1581,7 @@ kubernetes_role_type: str Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1595,7 +1595,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1611,7 +1611,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1627,7 +1627,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1641,7 +1641,7 @@ token_default_ttl: typing.Union[int, float] The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1655,7 +1655,7 @@ token_max_ttl: typing.Union[int, float] The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kubernetesSecretBackendRole.typescript.md b/docs/kubernetesSecretBackendRole.typescript.md index e6430e69..2bfe10cc 100644 --- a/docs/kubernetesSecretBackendRole.typescript.md +++ b/docs/kubernetesSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1074,7 +1074,7 @@ const kubernetesSecretBackendRoleConfig: kubernetesSecretBackendRole.KubernetesS | extraAnnotations | {[ key: string ]: string} | Additional annotations to apply to all generated Kubernetes objects. | | extraLabels | {[ key: string ]: string} | Additional labels to apply to all generated Kubernetes objects. | | generatedRoleRules | string | The Role or ClusterRole rules to use when generating a role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetesRoleName | string | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetesRoleType | string | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1165,7 +1165,7 @@ public readonly allowedKubernetesNamespaces: string[]; The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1179,7 +1179,7 @@ public readonly backend: string; The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1193,7 +1193,7 @@ public readonly name: string; The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1207,7 +1207,7 @@ public readonly extraAnnotations: {[ key: string ]: string}; Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1221,7 +1221,7 @@ public readonly extraLabels: {[ key: string ]: string}; Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1237,7 +1237,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1249,7 +1249,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1268,7 +1268,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1282,7 +1282,7 @@ public readonly kubernetesRoleType: string; Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1296,7 +1296,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1312,7 +1312,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1328,7 +1328,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1342,7 +1342,7 @@ public readonly tokenDefaultTtl: number; The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1356,7 +1356,7 @@ public readonly tokenMaxTtl: number; The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kvSecret.csharp.md b/docs/kvSecret.csharp.md index 3af80431..05ac2572 100644 --- a/docs/kvSecret.csharp.md +++ b/docs/kvSecret.csharp.md @@ -4,7 +4,7 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -810,7 +810,7 @@ new KvSecretConfig { | Provisioners | object[] | *No description.* | | DataJson | string | JSON-encoded secret data to write. | | Path | string | Full path of the KV-V1 secret. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -895,7 +895,7 @@ public string DataJson { get; set; } JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -909,7 +909,7 @@ public string Path { get; set; } Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -921,7 +921,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -938,7 +938,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecret.go.md b/docs/kvSecret.go.md index c1a1e007..a62926f3 100644 --- a/docs/kvSecret.go.md +++ b/docs/kvSecret.go.md @@ -4,12 +4,12 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecret" kvsecret.NewKvSecret(scope Construct, id *string, config KvSecretConfig) KvSecret ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecret" kvsecret.KvSecret_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecret" kvsecret.KvSecret_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ kvsecret.KvSecret_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecret" kvsecret.KvSecret_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ kvsecret.KvSecret_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecret" kvsecret.KvSecret_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -780,7 +780,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecret" &kvsecret.KvSecretConfig { Connection: interface{}, @@ -810,7 +810,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecret" | Provisioners | *[]interface{} | *No description.* | | DataJson | *string | JSON-encoded secret data to write. | | Path | *string | Full path of the KV-V1 secret. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -895,7 +895,7 @@ DataJson *string JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -909,7 +909,7 @@ Path *string Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -921,7 +921,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -938,7 +938,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecret.java.md b/docs/kvSecret.java.md index 2039f7fb..6bc87b85 100644 --- a/docs/kvSecret.java.md +++ b/docs/kvSecret.java.md @@ -4,7 +4,7 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers @@ -43,7 +43,7 @@ KvSecret.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | dataJson | java.lang.String | JSON-encoded secret data to write. | | path | java.lang.String | Full path of the KV-V1 secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -919,7 +919,7 @@ KvSecretConfig.builder() | provisioners | java.util.List | *No description.* | | dataJson | java.lang.String | JSON-encoded secret data to write. | | path | java.lang.String | Full path of the KV-V1 secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1004,7 +1004,7 @@ public java.lang.String getDataJson(); JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -1018,7 +1018,7 @@ public java.lang.String getPath(); Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -1030,7 +1030,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1047,7 +1047,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecret.python.md b/docs/kvSecret.python.md index a3528670..fe27a09d 100644 --- a/docs/kvSecret.python.md +++ b/docs/kvSecret.python.md @@ -4,7 +4,7 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers @@ -41,7 +41,7 @@ kvSecret.KvSecret( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | data_json | str | JSON-encoded secret data to write. | | path | str | Full path of the KV-V1 secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -959,7 +959,7 @@ kvSecret.KvSecretConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | data_json | str | JSON-encoded secret data to write. | | path | str | Full path of the KV-V1 secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1044,7 +1044,7 @@ data_json: str JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -1058,7 +1058,7 @@ path: str Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -1070,7 +1070,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1087,7 +1087,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecret.typescript.md b/docs/kvSecret.typescript.md index 65198b2d..24fdc97c 100644 --- a/docs/kvSecret.typescript.md +++ b/docs/kvSecret.typescript.md @@ -4,7 +4,7 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -798,7 +798,7 @@ const kvSecretConfig: kvSecret.KvSecretConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | dataJson | string | JSON-encoded secret data to write. | | path | string | Full path of the KV-V1 secret. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -883,7 +883,7 @@ public readonly dataJson: string; JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -897,7 +897,7 @@ public readonly path: string; Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -909,7 +909,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -926,7 +926,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecretBackendV2.csharp.md b/docs/kvSecretBackendV2.csharp.md index fef3af78..e6a6d28d 100644 --- a/docs/kvSecretBackendV2.csharp.md +++ b/docs/kvSecretBackendV2.csharp.md @@ -4,7 +4,7 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -867,7 +867,7 @@ new KvSecretBackendV2Config { | Mount | string | Path where KV-V2 engine is mounted. | | CasRequired | object | If true, all keys will require the cas parameter to be set on all write requests. | | DeleteVersionAfter | double | If set, specifies the length of time before a version is deleted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | MaxVersions | double | The number of versions to keep per key. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -953,7 +953,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -967,7 +967,7 @@ public object CasRequired { get; set; } If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -981,7 +981,7 @@ public double DeleteVersionAfter { get; set; } If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -993,7 +993,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ public double MaxVersions { get; set; } The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1024,7 +1024,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretBackendV2.go.md b/docs/kvSecretBackendV2.go.md index a25edf53..dc2137c6 100644 --- a/docs/kvSecretBackendV2.go.md +++ b/docs/kvSecretBackendV2.go.md @@ -4,12 +4,12 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretbackendv2" kvsecretbackendv2.NewKvSecretBackendV2(scope Construct, id *string, config KvSecretBackendV2Config) KvSecretBackendV2 ``` @@ -413,7 +413,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretbackendv2" kvsecretbackendv2.KvSecretBackendV2_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretbackendv2" kvsecretbackendv2.KvSecretBackendV2_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ kvsecretbackendv2.KvSecretBackendV2_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretbackendv2" kvsecretbackendv2.KvSecretBackendV2_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ kvsecretbackendv2.KvSecretBackendV2_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretbackendv2" kvsecretbackendv2.KvSecretBackendV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretbackendv2" &kvsecretbackendv2.KvSecretBackendV2Config { Connection: interface{}, @@ -867,7 +867,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretbackendv2" | Mount | *string | Path where KV-V2 engine is mounted. | | CasRequired | interface{} | If true, all keys will require the cas parameter to be set on all write requests. | | DeleteVersionAfter | *f64 | If set, specifies the length of time before a version is deleted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | MaxVersions | *f64 | The number of versions to keep per key. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -953,7 +953,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -967,7 +967,7 @@ CasRequired interface{} If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -981,7 +981,7 @@ DeleteVersionAfter *f64 If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -993,7 +993,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ MaxVersions *f64 The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1024,7 +1024,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretBackendV2.java.md b/docs/kvSecretBackendV2.java.md index d5e29d37..008de29a 100644 --- a/docs/kvSecretBackendV2.java.md +++ b/docs/kvSecretBackendV2.java.md @@ -4,7 +4,7 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers @@ -47,7 +47,7 @@ KvSecretBackendV2.Builder.create(Construct scope, java.lang.String id) | mount | java.lang.String | Path where KV-V2 engine is mounted. | | casRequired | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, all keys will require the cas parameter to be set on all write requests. | | deleteVersionAfter | java.lang.Number | If set, specifies the length of time before a version is deleted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | maxVersions | java.lang.Number | The number of versions to keep per key. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -119,7 +119,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -129,7 +129,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -139,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -160,7 +160,7 @@ If you experience problems setting this value it might not be settable. Please t The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- @@ -632,7 +632,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -1002,7 +1002,7 @@ KvSecretBackendV2Config.builder() | mount | java.lang.String | Path where KV-V2 engine is mounted. | | casRequired | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, all keys will require the cas parameter to be set on all write requests. | | deleteVersionAfter | java.lang.Number | If set, specifies the length of time before a version is deleted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | maxVersions | java.lang.Number | The number of versions to keep per key. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1088,7 +1088,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -1102,7 +1102,7 @@ public java.lang.Object getCasRequired(); If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -1116,7 +1116,7 @@ public java.lang.Number getDeleteVersionAfter(); If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -1128,7 +1128,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1145,7 +1145,7 @@ public java.lang.Number getMaxVersions(); The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1159,7 +1159,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretBackendV2.python.md b/docs/kvSecretBackendV2.python.md index edb538e4..be6cbade 100644 --- a/docs/kvSecretBackendV2.python.md +++ b/docs/kvSecretBackendV2.python.md @@ -4,7 +4,7 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers @@ -44,7 +44,7 @@ kvSecretBackendV2.KvSecretBackendV2( | mount | str | Path where KV-V2 engine is mounted. | | cas_required | typing.Union[bool, cdktf.IResolvable] | If true, all keys will require the cas parameter to be set on all write requests. | | delete_version_after | typing.Union[int, float] | If set, specifies the length of time before a version is deleted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | max_versions | typing.Union[int, float] | The number of versions to keep per key. | | namespace | str | Target namespace. (requires Enterprise). | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- @@ -675,7 +675,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -1040,7 +1040,7 @@ kvSecretBackendV2.KvSecretBackendV2Config( | mount | str | Path where KV-V2 engine is mounted. | | cas_required | typing.Union[bool, cdktf.IResolvable] | If true, all keys will require the cas parameter to be set on all write requests. | | delete_version_after | typing.Union[int, float] | If set, specifies the length of time before a version is deleted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | max_versions | typing.Union[int, float] | The number of versions to keep per key. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1126,7 +1126,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -1140,7 +1140,7 @@ cas_required: typing.Union[bool, IResolvable] If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -1154,7 +1154,7 @@ delete_version_after: typing.Union[int, float] If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -1166,7 +1166,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ max_versions: typing.Union[int, float] The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1197,7 +1197,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretBackendV2.typescript.md b/docs/kvSecretBackendV2.typescript.md index 97ffb865..46be97ac 100644 --- a/docs/kvSecretBackendV2.typescript.md +++ b/docs/kvSecretBackendV2.typescript.md @@ -4,7 +4,7 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -853,7 +853,7 @@ const kvSecretBackendV2Config: kvSecretBackendV2.KvSecretBackendV2Config = { ... | mount | string | Path where KV-V2 engine is mounted. | | casRequired | boolean \| cdktf.IResolvable | If true, all keys will require the cas parameter to be set on all write requests. | | deleteVersionAfter | number | If set, specifies the length of time before a version is deleted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | maxVersions | number | The number of versions to keep per key. | | namespace | string | Target namespace. (requires Enterprise). | @@ -939,7 +939,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -953,7 +953,7 @@ public readonly casRequired: boolean | IResolvable; If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -967,7 +967,7 @@ public readonly deleteVersionAfter: number; If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -979,7 +979,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -996,7 +996,7 @@ public readonly maxVersions: number; The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1010,7 +1010,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretV2.csharp.md b/docs/kvSecretV2.csharp.md index 6fdb52bd..3afd2007 100644 --- a/docs/kvSecretV2.csharp.md +++ b/docs/kvSecretV2.csharp.md @@ -4,7 +4,7 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -529,7 +529,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -1023,7 +1023,7 @@ new KvSecretV2Config { | CustomMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | DeleteAllVersions | object | If set to true, permanently deletes all versions for the specified key. | | DisableRead | object | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Options | System.Collections.Generic.IDictionary | An object that holds option settings. | @@ -1109,7 +1109,7 @@ public string DataJson { get; set; } JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1123,7 +1123,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1139,7 +1139,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1155,7 +1155,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1169,7 +1169,7 @@ public KvSecretV2CustomMetadata CustomMetadata { get; set; } custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1183,7 +1183,7 @@ public object DeleteAllVersions { get; set; } If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1197,7 +1197,7 @@ public object DisableRead { get; set; } If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1209,7 +1209,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1226,7 +1226,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1240,7 +1240,7 @@ public System.Collections.Generic.IDictionary Options { get; set An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1280,7 +1280,7 @@ public object CasRequired { get; set; } If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1294,7 +1294,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1308,7 +1308,7 @@ public double DeleteVersionAfter { get; set; } If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1322,7 +1322,7 @@ public double MaxVersions { get; set; } The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- diff --git a/docs/kvSecretV2.go.md b/docs/kvSecretV2.go.md index 44b23f0b..b2604963 100644 --- a/docs/kvSecretV2.go.md +++ b/docs/kvSecretV2.go.md @@ -4,12 +4,12 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretv2" kvsecretv2.NewKvSecretV2(scope Construct, id *string, config KvSecretV2Config) KvSecretV2 ``` @@ -440,7 +440,7 @@ func ResetOptions() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretv2" kvsecretv2.KvSecretV2_IsConstruct(x interface{}) *bool ``` @@ -472,7 +472,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretv2" kvsecretv2.KvSecretV2_IsTerraformElement(x interface{}) *bool ``` @@ -486,7 +486,7 @@ kvsecretv2.KvSecretV2_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretv2" kvsecretv2.KvSecretV2_IsTerraformResource(x interface{}) *bool ``` @@ -500,7 +500,7 @@ kvsecretv2.KvSecretV2_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretv2" kvsecretv2.KvSecretV2_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -529,7 +529,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -982,7 +982,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretv2" &kvsecretv2.KvSecretV2Config { Connection: interface{}, @@ -996,7 +996,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" Mount: *string, Name: *string, Cas: *f64, - CustomMetadata: github.com/cdktf/cdktf-provider-vault-go/vault/v12.kvSecretV2.KvSecretV2CustomMetadata, + CustomMetadata: github.com/cdktf/cdktf-provider-vault-go/vault/v13.kvSecretV2.KvSecretV2CustomMetadata, DeleteAllVersions: interface{}, DisableRead: interface{}, Id: *string, @@ -1023,7 +1023,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" | CustomMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | DeleteAllVersions | interface{} | If set to true, permanently deletes all versions for the specified key. | | DisableRead | interface{} | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Options | *map[string]*string | An object that holds option settings. | @@ -1109,7 +1109,7 @@ DataJson *string JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1123,7 +1123,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1139,7 +1139,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1155,7 +1155,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1169,7 +1169,7 @@ CustomMetadata KvSecretV2CustomMetadata custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1183,7 +1183,7 @@ DeleteAllVersions interface{} If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1197,7 +1197,7 @@ DisableRead interface{} If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1209,7 +1209,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1226,7 +1226,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1240,7 +1240,7 @@ Options *map[string]*string An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1249,7 +1249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretv2" &kvsecretv2.KvSecretV2CustomMetadata { CasRequired: interface{}, @@ -1280,7 +1280,7 @@ CasRequired interface{} If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1294,7 +1294,7 @@ Data *map[string]*string A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1308,7 +1308,7 @@ DeleteVersionAfter *f64 If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1322,7 +1322,7 @@ MaxVersions *f64 The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- @@ -1333,7 +1333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/kvsecretv2" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretv2" kvsecretv2.NewKvSecretV2CustomMetadataOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string) KvSecretV2CustomMetadataOutputReference ``` diff --git a/docs/kvSecretV2.java.md b/docs/kvSecretV2.java.md index ac9d03bd..cc191e8e 100644 --- a/docs/kvSecretV2.java.md +++ b/docs/kvSecretV2.java.md @@ -4,7 +4,7 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -56,7 +56,7 @@ KvSecretV2.Builder.create(Construct scope, java.lang.String id) | customMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | deleteAllVersions | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, permanently deletes all versions for the specified key. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | options | java.util.Map | An object that holds option settings. | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -150,7 +150,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -162,7 +162,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -213,7 +213,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -712,7 +712,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -1212,7 +1212,7 @@ KvSecretV2Config.builder() | customMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | deleteAllVersions | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, permanently deletes all versions for the specified key. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | options | java.util.Map | An object that holds option settings. | @@ -1298,7 +1298,7 @@ public java.lang.String getDataJson(); JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1312,7 +1312,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1328,7 +1328,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1344,7 +1344,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1358,7 +1358,7 @@ public KvSecretV2CustomMetadata getCustomMetadata(); custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1372,7 +1372,7 @@ public java.lang.Object getDeleteAllVersions(); If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1386,7 +1386,7 @@ public java.lang.Object getDisableRead(); If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1398,7 +1398,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1415,7 +1415,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1429,7 +1429,7 @@ public java.util.Map getOptions(); An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1470,7 +1470,7 @@ public java.lang.Object getCasRequired(); If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1484,7 +1484,7 @@ public java.util.Map getData(); A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1498,7 +1498,7 @@ public java.lang.Number getDeleteVersionAfter(); If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1512,7 +1512,7 @@ public java.lang.Number getMaxVersions(); The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- diff --git a/docs/kvSecretV2.python.md b/docs/kvSecretV2.python.md index ec9df6cd..9219f496 100644 --- a/docs/kvSecretV2.python.md +++ b/docs/kvSecretV2.python.md @@ -4,7 +4,7 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -52,7 +52,7 @@ kvSecretV2.KvSecretV2( | custom_metadata | KvSecretV2CustomMetadata | custom_metadata block. | | delete_all_versions | typing.Union[bool, cdktf.IResolvable] | If set to true, permanently deletes all versions for the specified key. | | disable_read | typing.Union[bool, cdktf.IResolvable] | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | options | typing.Mapping[str] | An object that holds option settings. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -146,7 +146,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -158,7 +158,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -209,7 +209,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -603,7 +603,7 @@ def put_custom_metadata( If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -613,7 +613,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -623,7 +623,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -633,7 +633,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- @@ -793,7 +793,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -1287,7 +1287,7 @@ kvSecretV2.KvSecretV2Config( | custom_metadata | KvSecretV2CustomMetadata | custom_metadata block. | | delete_all_versions | typing.Union[bool, cdktf.IResolvable] | If set to true, permanently deletes all versions for the specified key. | | disable_read | typing.Union[bool, cdktf.IResolvable] | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | options | typing.Mapping[str] | An object that holds option settings. | @@ -1373,7 +1373,7 @@ data_json: str JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1387,7 +1387,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1403,7 +1403,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1419,7 +1419,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1433,7 +1433,7 @@ custom_metadata: KvSecretV2CustomMetadata custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1447,7 +1447,7 @@ delete_all_versions: typing.Union[bool, IResolvable] If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1461,7 +1461,7 @@ disable_read: typing.Union[bool, IResolvable] If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1473,7 +1473,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1490,7 +1490,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1504,7 +1504,7 @@ options: typing.Mapping[str] An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1544,7 +1544,7 @@ cas_required: typing.Union[bool, IResolvable] If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1558,7 +1558,7 @@ data: typing.Mapping[str] A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1572,7 +1572,7 @@ delete_version_after: typing.Union[int, float] If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1586,7 +1586,7 @@ max_versions: typing.Union[int, float] The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- diff --git a/docs/kvSecretV2.typescript.md b/docs/kvSecretV2.typescript.md index 7c77dbe9..aea0ba10 100644 --- a/docs/kvSecretV2.typescript.md +++ b/docs/kvSecretV2.typescript.md @@ -4,7 +4,7 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -529,7 +529,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -1005,7 +1005,7 @@ const kvSecretV2Config: kvSecretV2.KvSecretV2Config = { ... } | customMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | deleteAllVersions | boolean \| cdktf.IResolvable | If set to true, permanently deletes all versions for the specified key. | | disableRead | boolean \| cdktf.IResolvable | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | string | Target namespace. (requires Enterprise). | | options | {[ key: string ]: string} | An object that holds option settings. | @@ -1091,7 +1091,7 @@ public readonly dataJson: string; JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1105,7 +1105,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1121,7 +1121,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1137,7 +1137,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1151,7 +1151,7 @@ public readonly customMetadata: KvSecretV2CustomMetadata; custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1165,7 +1165,7 @@ public readonly deleteAllVersions: boolean | IResolvable; If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1179,7 +1179,7 @@ public readonly disableRead: boolean | IResolvable; If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1191,7 +1191,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1208,7 +1208,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1222,7 +1222,7 @@ public readonly options: {[ key: string ]: string}; An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1257,7 +1257,7 @@ public readonly casRequired: boolean | IResolvable; If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1271,7 +1271,7 @@ public readonly data: {[ key: string ]: string}; A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1285,7 +1285,7 @@ public readonly deleteVersionAfter: number; If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1299,7 +1299,7 @@ public readonly maxVersions: number; The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- diff --git a/docs/ldapAuthBackend.csharp.md b/docs/ldapAuthBackend.csharp.md index 3c4a58e3..234f5761 100644 --- a/docs/ldapAuthBackend.csharp.md +++ b/docs/ldapAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers @@ -726,7 +726,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1835,29 +1835,29 @@ new LdapAuthBackendConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Url | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| Binddn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| Bindpass | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| CaseSensitiveNames | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| Certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| ClientTlsCert | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| ClientTlsKey | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| DenyNullBind | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| Url | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| Binddn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| Bindpass | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| CaseSensitiveNames | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| Certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| ClientTlsCert | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| ClientTlsKey | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| DenyNullBind | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Discoverdn | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| Groupattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| Groupdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| Groupfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| InsecureTls | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| Discoverdn | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| Groupattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| Groupdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| Groupfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| InsecureTls | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | Local | object | Specifies if the auth method is local only. | -| MaxPageSize | double | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| MaxPageSize | double | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | Namespace | string | Target namespace. (requires Enterprise). | -| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| Starttls | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| TlsMaxVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| TlsMinVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| Starttls | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| TlsMaxVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| TlsMinVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | | TokenMaxTtl | double | The maximum lifetime of the generated token. | @@ -1867,12 +1867,12 @@ new LdapAuthBackendConfig { | TokenPolicies | string[] | Generated Token's Policies. | | TokenTtl | double | The initial ttl of the token to generate in seconds. | | TokenType | string | The type of token to generate, service or batch. | -| Upndomain | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| Userattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| Userdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| Userfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| Upndomain | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| Userattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| Userdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| Userfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | UsernameAsAlias | object | Force the auth method to use the username passed by the user as the alias name. | -| UseTokenGroups | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| UseTokenGroups | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -1954,7 +1954,7 @@ public string Url { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -1966,7 +1966,7 @@ public string Binddn { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -1978,7 +1978,7 @@ public string Bindpass { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -1990,7 +1990,7 @@ public object CaseSensitiveNames { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -2002,7 +2002,7 @@ public string Certificate { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -2014,7 +2014,7 @@ public string ClientTlsCert { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -2026,7 +2026,7 @@ public string ClientTlsKey { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. --- @@ -2038,7 +2038,7 @@ public object DenyNullBind { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2050,7 +2050,7 @@ public string Description { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2064,7 +2064,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2076,7 +2076,7 @@ public object Discoverdn { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2088,7 +2088,7 @@ public string Groupattr { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2100,7 +2100,7 @@ public string Groupdn { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2112,7 +2112,7 @@ public string Groupfilter { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2124,7 +2124,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2139,7 +2139,7 @@ public object InsecureTls { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2153,7 +2153,7 @@ public object Local { get; set; } Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2165,7 +2165,7 @@ public double MaxPageSize { get; set; } - *Type:* double -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2179,7 +2179,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2191,7 +2191,7 @@ public string Path { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2203,7 +2203,7 @@ public object Starttls { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2215,7 +2215,7 @@ public string TlsMaxVersion { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2227,7 +2227,7 @@ public string TlsMinVersion { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2241,7 +2241,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2255,7 +2255,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2269,7 +2269,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2283,7 +2283,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2297,7 +2297,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2311,7 +2311,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2325,7 +2325,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2339,7 +2339,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2353,7 +2353,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2365,7 +2365,7 @@ public string Upndomain { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2377,7 +2377,7 @@ public string Userattr { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2389,7 +2389,7 @@ public string Userdn { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2401,7 +2401,7 @@ public string Userfilter { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2415,7 +2415,7 @@ public object UsernameAsAlias { get; set; } Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2427,7 +2427,7 @@ public object UseTokenGroups { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackend.go.md b/docs/ldapAuthBackend.go.md index 6ae99e2a..8536d53a 100644 --- a/docs/ldapAuthBackend.go.md +++ b/docs/ldapAuthBackend.go.md @@ -4,12 +4,12 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackend" ldapauthbackend.NewLdapAuthBackend(scope Construct, id *string, config LdapAuthBackendConfig) LdapAuthBackend ``` @@ -637,7 +637,7 @@ func ResetUseTokenGroups() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackend" ldapauthbackend.LdapAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -669,7 +669,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackend" ldapauthbackend.LdapAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -683,7 +683,7 @@ ldapauthbackend.LdapAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackend" ldapauthbackend.LdapAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -697,7 +697,7 @@ ldapauthbackend.LdapAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackend" ldapauthbackend.LdapAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -726,7 +726,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1773,7 +1773,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackend" &ldapauthbackend.LdapAuthBackendConfig { Connection: interface{}, @@ -1835,29 +1835,29 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Url | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| Binddn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| Bindpass | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| CaseSensitiveNames | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| Certificate | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| ClientTlsCert | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| ClientTlsKey | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| DenyNullBind | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| Url | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| Binddn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| Bindpass | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| CaseSensitiveNames | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| Certificate | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| ClientTlsCert | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| ClientTlsKey | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| DenyNullBind | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Discoverdn | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| Groupattr | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| Groupdn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| Groupfilter | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| InsecureTls | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| Discoverdn | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| Groupattr | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| Groupdn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| Groupfilter | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| InsecureTls | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | Local | interface{} | Specifies if the auth method is local only. | -| MaxPageSize | *f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| MaxPageSize | *f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| Starttls | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| TlsMaxVersion | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| TlsMinVersion | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| Starttls | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| TlsMaxVersion | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| TlsMinVersion | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | | TokenMaxTtl | *f64 | The maximum lifetime of the generated token. | @@ -1867,12 +1867,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackend" | TokenPolicies | *[]*string | Generated Token's Policies. | | TokenTtl | *f64 | The initial ttl of the token to generate in seconds. | | TokenType | *string | The type of token to generate, service or batch. | -| Upndomain | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| Userattr | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| Userdn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| Userfilter | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| Upndomain | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| Userattr | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| Userdn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| Userfilter | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | UsernameAsAlias | interface{} | Force the auth method to use the username passed by the user as the alias name. | -| UseTokenGroups | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| UseTokenGroups | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -1954,7 +1954,7 @@ Url *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -1966,7 +1966,7 @@ Binddn *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -1978,7 +1978,7 @@ Bindpass *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -1990,7 +1990,7 @@ CaseSensitiveNames interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -2002,7 +2002,7 @@ Certificate *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -2014,7 +2014,7 @@ ClientTlsCert *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -2026,7 +2026,7 @@ ClientTlsKey *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. --- @@ -2038,7 +2038,7 @@ DenyNullBind interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2050,7 +2050,7 @@ Description *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2064,7 +2064,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2076,7 +2076,7 @@ Discoverdn interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2088,7 +2088,7 @@ Groupattr *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2100,7 +2100,7 @@ Groupdn *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2112,7 +2112,7 @@ Groupfilter *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2124,7 +2124,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2139,7 +2139,7 @@ InsecureTls interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2153,7 +2153,7 @@ Local interface{} Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2165,7 +2165,7 @@ MaxPageSize *f64 - *Type:* *f64 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2179,7 +2179,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2191,7 +2191,7 @@ Path *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2203,7 +2203,7 @@ Starttls interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2215,7 +2215,7 @@ TlsMaxVersion *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2227,7 +2227,7 @@ TlsMinVersion *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2241,7 +2241,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2255,7 +2255,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2269,7 +2269,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2283,7 +2283,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2297,7 +2297,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2311,7 +2311,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2325,7 +2325,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2339,7 +2339,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2353,7 +2353,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2365,7 +2365,7 @@ Upndomain *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2377,7 +2377,7 @@ Userattr *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2389,7 +2389,7 @@ Userdn *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2401,7 +2401,7 @@ Userfilter *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2415,7 +2415,7 @@ UsernameAsAlias interface{} Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2427,7 +2427,7 @@ UseTokenGroups interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackend.java.md b/docs/ldapAuthBackend.java.md index 33b7b290..17d88f85 100644 --- a/docs/ldapAuthBackend.java.md +++ b/docs/ldapAuthBackend.java.md @@ -4,7 +4,7 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers @@ -85,29 +85,29 @@ LdapAuthBackend.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| url | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| caseSensitiveNames | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| clientTlsCert | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| clientTlsKey | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| denyNullBind | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| caseSensitiveNames | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| clientTlsCert | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| clientTlsKey | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| denyNullBind | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | -| maxPageSize | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| maxPageSize | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tlsMaxVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tlsMinVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tlsMaxVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tlsMinVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | java.lang.Number | The maximum lifetime of the generated token. | @@ -117,12 +117,12 @@ LdapAuthBackend.Builder.create(Construct scope, java.lang.String id) | tokenPolicies | java.util.List | Generated Token's Policies. | | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | -| upndomain | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | usernameAsAlias | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Force the auth method to use the username passed by the user as the alias name. | -| useTokenGroups | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| useTokenGroups | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -190,7 +190,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -264,7 +264,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -280,7 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -304,7 +304,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -315,7 +315,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -325,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -333,7 +333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -343,7 +343,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -351,7 +351,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -367,7 +367,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -385,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -395,7 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -405,7 +405,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -415,7 +415,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -425,7 +425,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -435,7 +435,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -445,7 +445,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -455,7 +455,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -465,7 +465,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -473,7 +473,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -481,7 +481,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -489,7 +489,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -497,7 +497,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -507,7 +507,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -515,7 +515,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- @@ -1201,7 +1201,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -2324,29 +2324,29 @@ LdapAuthBackendConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| url | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| caseSensitiveNames | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| clientTlsCert | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| clientTlsKey | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| denyNullBind | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| caseSensitiveNames | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| clientTlsCert | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| clientTlsKey | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| denyNullBind | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | -| maxPageSize | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| maxPageSize | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tlsMaxVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tlsMinVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tlsMaxVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tlsMinVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | java.lang.Number | The maximum lifetime of the generated token. | @@ -2356,12 +2356,12 @@ LdapAuthBackendConfig.builder() | tokenPolicies | java.util.List | Generated Token's Policies. | | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | -| upndomain | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | usernameAsAlias | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Force the auth method to use the username passed by the user as the alias name. | -| useTokenGroups | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| useTokenGroups | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -2443,7 +2443,7 @@ public java.lang.String getUrl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -2455,7 +2455,7 @@ public java.lang.String getBinddn(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -2467,7 +2467,7 @@ public java.lang.String getBindpass(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -2479,7 +2479,7 @@ public java.lang.Object getCaseSensitiveNames(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -2491,7 +2491,7 @@ public java.lang.String getCertificate(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -2503,7 +2503,7 @@ public java.lang.String getClientTlsCert(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -2515,7 +2515,7 @@ public java.lang.String getClientTlsKey(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. --- @@ -2527,7 +2527,7 @@ public java.lang.Object getDenyNullBind(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2539,7 +2539,7 @@ public java.lang.String getDescription(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2553,7 +2553,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2565,7 +2565,7 @@ public java.lang.Object getDiscoverdn(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2577,7 +2577,7 @@ public java.lang.String getGroupattr(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2589,7 +2589,7 @@ public java.lang.String getGroupdn(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2601,7 +2601,7 @@ public java.lang.String getGroupfilter(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2613,7 +2613,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2628,7 +2628,7 @@ public java.lang.Object getInsecureTls(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2642,7 +2642,7 @@ public java.lang.Object getLocal(); Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2654,7 +2654,7 @@ public java.lang.Number getMaxPageSize(); - *Type:* java.lang.Number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2668,7 +2668,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2680,7 +2680,7 @@ public java.lang.String getPath(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2692,7 +2692,7 @@ public java.lang.Object getStarttls(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2704,7 +2704,7 @@ public java.lang.String getTlsMaxVersion(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2716,7 +2716,7 @@ public java.lang.String getTlsMinVersion(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2730,7 +2730,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2744,7 +2744,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2758,7 +2758,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2772,7 +2772,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2786,7 +2786,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2800,7 +2800,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2814,7 +2814,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2828,7 +2828,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2842,7 +2842,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2854,7 +2854,7 @@ public java.lang.String getUpndomain(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2866,7 +2866,7 @@ public java.lang.String getUserattr(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2878,7 +2878,7 @@ public java.lang.String getUserdn(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2890,7 +2890,7 @@ public java.lang.String getUserfilter(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2904,7 +2904,7 @@ public java.lang.Object getUsernameAsAlias(); Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2916,7 +2916,7 @@ public java.lang.Object getUseTokenGroups(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackend.python.md b/docs/ldapAuthBackend.python.md index d30bf3c8..4b4bc321 100644 --- a/docs/ldapAuthBackend.python.md +++ b/docs/ldapAuthBackend.python.md @@ -4,7 +4,7 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers @@ -73,29 +73,29 @@ ldapAuthBackend.LdapAuthBackend( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| url | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| case_sensitive_names | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| client_tls_cert | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| client_tls_key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| deny_null_bind | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| case_sensitive_names | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| client_tls_cert | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| client_tls_key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| deny_null_bind | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| discoverdn | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecure_tls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecure_tls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | -| max_page_size | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| max_page_size | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | str | Target namespace. (requires Enterprise). | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tls_max_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tls_min_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tls_max_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tls_min_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | | token_max_ttl | typing.Union[int, float] | The maximum lifetime of the generated token. | @@ -105,12 +105,12 @@ ldapAuthBackend.LdapAuthBackend( | token_policies | typing.List[str] | Generated Token's Policies. | | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | -| upndomain | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | username_as_alias | typing.Union[bool, cdktf.IResolvable] | Force the auth method to use the username passed by the user as the alias name. | -| use_token_groups | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| use_token_groups | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -178,7 +178,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. --- @@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -260,7 +260,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -284,7 +284,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -303,7 +303,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -321,7 +321,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[int, float] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -331,7 +331,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -347,7 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -355,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -363,7 +363,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -373,7 +373,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -383,7 +383,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -393,7 +393,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -403,7 +403,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -413,7 +413,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -423,7 +423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -433,7 +433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -443,7 +443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -453,7 +453,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -461,7 +461,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -469,7 +469,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -477,7 +477,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -485,7 +485,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -495,7 +495,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -503,7 +503,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- @@ -1235,7 +1235,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -2344,29 +2344,29 @@ ldapAuthBackend.LdapAuthBackendConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| url | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| case_sensitive_names | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| client_tls_cert | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| client_tls_key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| deny_null_bind | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| case_sensitive_names | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| client_tls_cert | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| client_tls_key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| deny_null_bind | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| discoverdn | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecure_tls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecure_tls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | -| max_page_size | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| max_page_size | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | str | Target namespace. (requires Enterprise). | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tls_max_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tls_min_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tls_max_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tls_min_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | | token_max_ttl | typing.Union[int, float] | The maximum lifetime of the generated token. | @@ -2376,12 +2376,12 @@ ldapAuthBackend.LdapAuthBackendConfig( | token_policies | typing.List[str] | Generated Token's Policies. | | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | -| upndomain | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | username_as_alias | typing.Union[bool, cdktf.IResolvable] | Force the auth method to use the username passed by the user as the alias name. | -| use_token_groups | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| use_token_groups | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -2463,7 +2463,7 @@ url: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -2475,7 +2475,7 @@ binddn: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -2487,7 +2487,7 @@ bindpass: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -2499,7 +2499,7 @@ case_sensitive_names: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -2511,7 +2511,7 @@ certificate: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -2523,7 +2523,7 @@ client_tls_cert: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -2535,7 +2535,7 @@ client_tls_key: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. --- @@ -2547,7 +2547,7 @@ deny_null_bind: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2559,7 +2559,7 @@ description: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2573,7 +2573,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2585,7 +2585,7 @@ discoverdn: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2597,7 +2597,7 @@ groupattr: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2609,7 +2609,7 @@ groupdn: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2621,7 +2621,7 @@ groupfilter: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2633,7 +2633,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2648,7 +2648,7 @@ insecure_tls: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2662,7 +2662,7 @@ local: typing.Union[bool, IResolvable] Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2674,7 +2674,7 @@ max_page_size: typing.Union[int, float] - *Type:* typing.Union[int, float] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2688,7 +2688,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2700,7 +2700,7 @@ path: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2712,7 +2712,7 @@ starttls: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2724,7 +2724,7 @@ tls_max_version: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2736,7 +2736,7 @@ tls_min_version: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2750,7 +2750,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2764,7 +2764,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2778,7 +2778,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2792,7 +2792,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2806,7 +2806,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2820,7 +2820,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2834,7 +2834,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2848,7 +2848,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2862,7 +2862,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2874,7 +2874,7 @@ upndomain: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2886,7 +2886,7 @@ userattr: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2898,7 +2898,7 @@ userdn: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2910,7 +2910,7 @@ userfilter: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2924,7 +2924,7 @@ username_as_alias: typing.Union[bool, IResolvable] Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2936,7 +2936,7 @@ use_token_groups: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackend.typescript.md b/docs/ldapAuthBackend.typescript.md index 718a41a1..d7fb2d77 100644 --- a/docs/ldapAuthBackend.typescript.md +++ b/docs/ldapAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers @@ -726,7 +726,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1789,29 +1789,29 @@ const ldapAuthBackendConfig: ldapAuthBackend.LdapAuthBackendConfig = { ... } | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| url | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| caseSensitiveNames | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| clientTlsCert | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| clientTlsKey | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| denyNullBind | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| caseSensitiveNames | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| clientTlsCert | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| clientTlsKey | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| denyNullBind | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| discoverdn | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecureTls | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecureTls | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | boolean \| cdktf.IResolvable | Specifies if the auth method is local only. | -| maxPageSize | number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| maxPageSize | number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | string | Target namespace. (requires Enterprise). | -| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tlsMaxVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tlsMinVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tlsMaxVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tlsMinVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | number | The maximum lifetime of the generated token. | @@ -1821,12 +1821,12 @@ const ldapAuthBackendConfig: ldapAuthBackend.LdapAuthBackendConfig = { ... } | tokenPolicies | string[] | Generated Token's Policies. | | tokenTtl | number | The initial ttl of the token to generate in seconds. | | tokenType | string | The type of token to generate, service or batch. | -| upndomain | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | usernameAsAlias | boolean \| cdktf.IResolvable | Force the auth method to use the username passed by the user as the alias name. | -| useTokenGroups | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| useTokenGroups | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -1908,7 +1908,7 @@ public readonly url: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -1920,7 +1920,7 @@ public readonly binddn: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -1932,7 +1932,7 @@ public readonly bindpass: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -1944,7 +1944,7 @@ public readonly caseSensitiveNames: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -1956,7 +1956,7 @@ public readonly certificate: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -1968,7 +1968,7 @@ public readonly clientTlsCert: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -1980,7 +1980,7 @@ public readonly clientTlsKey: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. --- @@ -1992,7 +1992,7 @@ public readonly denyNullBind: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2004,7 +2004,7 @@ public readonly description: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2018,7 +2018,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2030,7 +2030,7 @@ public readonly discoverdn: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2042,7 +2042,7 @@ public readonly groupattr: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2054,7 +2054,7 @@ public readonly groupdn: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2066,7 +2066,7 @@ public readonly groupfilter: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2078,7 +2078,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2093,7 +2093,7 @@ public readonly insecureTls: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2107,7 +2107,7 @@ public readonly local: boolean | IResolvable; Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2119,7 +2119,7 @@ public readonly maxPageSize: number; - *Type:* number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2133,7 +2133,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2145,7 +2145,7 @@ public readonly path: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2157,7 +2157,7 @@ public readonly starttls: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2169,7 +2169,7 @@ public readonly tlsMaxVersion: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2181,7 +2181,7 @@ public readonly tlsMinVersion: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2195,7 +2195,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2209,7 +2209,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2223,7 +2223,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2237,7 +2237,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2251,7 +2251,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2265,7 +2265,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2279,7 +2279,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2293,7 +2293,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2307,7 +2307,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2319,7 +2319,7 @@ public readonly upndomain: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2331,7 +2331,7 @@ public readonly userattr: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2343,7 +2343,7 @@ public readonly userdn: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2355,7 +2355,7 @@ public readonly userfilter: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2369,7 +2369,7 @@ public readonly usernameAsAlias: boolean | IResolvable; Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2381,7 +2381,7 @@ public readonly useTokenGroups: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackendGroup.csharp.md b/docs/ldapAuthBackendGroup.csharp.md index b2729b2a..4032ccbd 100644 --- a/docs/ldapAuthBackendGroup.csharp.md +++ b/docs/ldapAuthBackendGroup.csharp.md @@ -4,7 +4,7 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -834,11 +834,11 @@ new LdapAuthBackendGroupConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Groupname | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| Groupname | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | Namespace | string | Target namespace. (requires Enterprise). | -| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -920,7 +920,7 @@ public string Groupname { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -932,7 +932,7 @@ public string Backend { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -944,7 +944,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -961,7 +961,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -973,7 +973,7 @@ public string[] Policies { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendGroup.go.md b/docs/ldapAuthBackendGroup.go.md index 31858b4a..1159baa7 100644 --- a/docs/ldapAuthBackendGroup.go.md +++ b/docs/ldapAuthBackendGroup.go.md @@ -4,12 +4,12 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackendgroup" ldapauthbackendgroup.NewLdapAuthBackendGroup(scope Construct, id *string, config LdapAuthBackendGroupConfig) LdapAuthBackendGroup ``` @@ -406,7 +406,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackendgroup" ldapauthbackendgroup.LdapAuthBackendGroup_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackendgroup" ldapauthbackendgroup.LdapAuthBackendGroup_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ ldapauthbackendgroup.LdapAuthBackendGroup_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackendgroup" ldapauthbackendgroup.LdapAuthBackendGroup_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ ldapauthbackendgroup.LdapAuthBackendGroup_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackendgroup" ldapauthbackendgroup.LdapAuthBackendGroup_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -805,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackendgroup" &ldapauthbackendgroup.LdapAuthBackendGroupConfig { Connection: interface{}, @@ -834,11 +834,11 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackendgroup" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Groupname | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| Groupname | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -920,7 +920,7 @@ Groupname *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -932,7 +932,7 @@ Backend *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -944,7 +944,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -961,7 +961,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -973,7 +973,7 @@ Policies *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendGroup.java.md b/docs/ldapAuthBackendGroup.java.md index 0654237a..f38cc1b3 100644 --- a/docs/ldapAuthBackendGroup.java.md +++ b/docs/ldapAuthBackendGroup.java.md @@ -4,7 +4,7 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers @@ -42,11 +42,11 @@ LdapAuthBackendGroup.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| groupname | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- @@ -606,7 +606,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -949,11 +949,11 @@ LdapAuthBackendGroupConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| groupname | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -1035,7 +1035,7 @@ public java.lang.String getGroupname(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -1047,7 +1047,7 @@ public java.lang.String getBackend(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -1059,7 +1059,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -1088,7 +1088,7 @@ public java.util.List getPolicies(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendGroup.python.md b/docs/ldapAuthBackendGroup.python.md index 8808f1b6..a062ceef 100644 --- a/docs/ldapAuthBackendGroup.python.md +++ b/docs/ldapAuthBackendGroup.python.md @@ -4,7 +4,7 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers @@ -40,11 +40,11 @@ ldapAuthBackendGroup.LdapAuthBackendGroup( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| groupname | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -141,7 +141,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- @@ -650,7 +650,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -989,11 +989,11 @@ ldapAuthBackendGroup.LdapAuthBackendGroupConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| groupname | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -1075,7 +1075,7 @@ groupname: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -1087,7 +1087,7 @@ backend: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -1099,7 +1099,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1116,7 +1116,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -1128,7 +1128,7 @@ policies: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendGroup.typescript.md b/docs/ldapAuthBackendGroup.typescript.md index 89f07a3d..39898264 100644 --- a/docs/ldapAuthBackendGroup.typescript.md +++ b/docs/ldapAuthBackendGroup.typescript.md @@ -4,7 +4,7 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -821,11 +821,11 @@ const ldapAuthBackendGroupConfig: ldapAuthBackendGroup.LdapAuthBackendGroupConfi | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| groupname | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | string | Target namespace. (requires Enterprise). | -| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -907,7 +907,7 @@ public readonly groupname: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -919,7 +919,7 @@ public readonly backend: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -931,7 +931,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -948,7 +948,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -960,7 +960,7 @@ public readonly policies: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendUser.csharp.md b/docs/ldapAuthBackendUser.csharp.md index 1b96463f..d3333d0d 100644 --- a/docs/ldapAuthBackendUser.csharp.md +++ b/docs/ldapAuthBackendUser.csharp.md @@ -4,7 +4,7 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -864,12 +864,12 @@ new LdapAuthBackendUserConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| Groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| Username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| Groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | Namespace | string | Target namespace. (requires Enterprise). | -| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -951,7 +951,7 @@ public string Username { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -963,7 +963,7 @@ public string Backend { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -975,7 +975,7 @@ public string[] Groups { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -987,7 +987,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1016,7 +1016,7 @@ public string[] Policies { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapAuthBackendUser.go.md b/docs/ldapAuthBackendUser.go.md index 7a1b1bae..57649850 100644 --- a/docs/ldapAuthBackendUser.go.md +++ b/docs/ldapAuthBackendUser.go.md @@ -4,12 +4,12 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackenduser" ldapauthbackenduser.NewLdapAuthBackendUser(scope Construct, id *string, config LdapAuthBackendUserConfig) LdapAuthBackendUser ``` @@ -413,7 +413,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackenduser" ldapauthbackenduser.LdapAuthBackendUser_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackenduser" ldapauthbackenduser.LdapAuthBackendUser_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ ldapauthbackenduser.LdapAuthBackendUser_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackenduser" ldapauthbackenduser.LdapAuthBackendUser_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ ldapauthbackenduser.LdapAuthBackendUser_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackenduser" ldapauthbackenduser.LdapAuthBackendUser_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackenduser" &ldapauthbackenduser.LdapAuthBackendUserConfig { Connection: interface{}, @@ -864,12 +864,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapauthbackenduser" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Username | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| Groups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| Username | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| Groups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -951,7 +951,7 @@ Username *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -963,7 +963,7 @@ Backend *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -975,7 +975,7 @@ Groups *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -987,7 +987,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1016,7 +1016,7 @@ Policies *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapAuthBackendUser.java.md b/docs/ldapAuthBackendUser.java.md index a61cc491..0ce04b97 100644 --- a/docs/ldapAuthBackendUser.java.md +++ b/docs/ldapAuthBackendUser.java.md @@ -4,7 +4,7 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers @@ -43,12 +43,12 @@ LdapAuthBackendUser.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- @@ -623,7 +623,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -989,12 +989,12 @@ LdapAuthBackendUserConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -1076,7 +1076,7 @@ public java.lang.String getUsername(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -1088,7 +1088,7 @@ public java.lang.String getBackend(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -1100,7 +1100,7 @@ public java.util.List getGroups(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -1112,7 +1112,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1129,7 +1129,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1141,7 +1141,7 @@ public java.util.List getPolicies(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapAuthBackendUser.python.md b/docs/ldapAuthBackendUser.python.md index f65951e2..b3ff5023 100644 --- a/docs/ldapAuthBackendUser.python.md +++ b/docs/ldapAuthBackendUser.python.md @@ -4,7 +4,7 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers @@ -41,12 +41,12 @@ ldapAuthBackendUser.LdapAuthBackendUser( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -151,7 +151,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- @@ -667,7 +667,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -1029,12 +1029,12 @@ ldapAuthBackendUser.LdapAuthBackendUserConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -1116,7 +1116,7 @@ username: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -1128,7 +1128,7 @@ backend: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -1140,7 +1140,7 @@ groups: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -1152,7 +1152,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1169,7 +1169,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1181,7 +1181,7 @@ policies: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapAuthBackendUser.typescript.md b/docs/ldapAuthBackendUser.typescript.md index 28051335..bb68152e 100644 --- a/docs/ldapAuthBackendUser.typescript.md +++ b/docs/ldapAuthBackendUser.typescript.md @@ -4,7 +4,7 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -850,12 +850,12 @@ const ldapAuthBackendUserConfig: ldapAuthBackendUser.LdapAuthBackendUserConfig = | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | string | Target namespace. (requires Enterprise). | -| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -937,7 +937,7 @@ public readonly username: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -949,7 +949,7 @@ public readonly backend: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -961,7 +961,7 @@ public readonly groups: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -973,7 +973,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -990,7 +990,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1002,7 +1002,7 @@ public readonly policies: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapSecretBackend.csharp.md b/docs/ldapSecretBackend.csharp.md index 59aa36b2..2fce5c26 100644 --- a/docs/ldapSecretBackend.csharp.md +++ b/docs/ldapSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers @@ -86,7 +86,6 @@ Must be unique amongst siblings in the same scope | ResetExternalEntropyAccess | *No description.* | | ResetId | *No description.* | | ResetInsecureTls | *No description.* | -| ResetLength | *No description.* | | ResetLocal | *No description.* | | ResetMaxLeaseTtlSeconds | *No description.* | | ResetNamespace | *No description.* | @@ -96,6 +95,7 @@ Must be unique amongst siblings in the same scope | ResetRequestTimeout | *No description.* | | ResetSchema | *No description.* | | ResetSealWrap | *No description.* | +| ResetSkipStaticRoleImportRotation | *No description.* | | ResetStarttls | *No description.* | | ResetUpndomain | *No description.* | | ResetUrl | *No description.* | @@ -470,12 +470,6 @@ private void ResetId() private void ResetInsecureTls() ``` -##### `ResetLength` - -```csharp -private void ResetLength() -``` - ##### `ResetLocal` ```csharp @@ -530,6 +524,12 @@ private void ResetSchema() private void ResetSealWrap() ``` +##### `ResetSkipStaticRoleImportRotation` + +```csharp +private void ResetSkipStaticRoleImportRotation() +``` + ##### `ResetStarttls` ```csharp @@ -663,7 +663,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -709,7 +709,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | ExternalEntropyAccessInput | object | *No description.* | | IdInput | string | *No description.* | | InsecureTlsInput | object | *No description.* | -| LengthInput | double | *No description.* | | LocalInput | object | *No description.* | | MaxLeaseTtlSecondsInput | double | *No description.* | | NamespaceInput | string | *No description.* | @@ -719,6 +718,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | RequestTimeoutInput | double | *No description.* | | SchemaInput | string | *No description.* | | SealWrapInput | object | *No description.* | +| SkipStaticRoleImportRotationInput | object | *No description.* | | StarttlsInput | object | *No description.* | | UpndomainInput | string | *No description.* | | UrlInput | string | *No description.* | @@ -739,7 +739,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | ExternalEntropyAccess | object | *No description.* | | Id | string | *No description.* | | InsecureTls | object | *No description.* | -| Length | double | *No description.* | | Local | object | *No description.* | | MaxLeaseTtlSeconds | double | *No description.* | | Namespace | string | *No description.* | @@ -749,6 +748,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | RequestTimeout | double | *No description.* | | Schema | string | *No description.* | | SealWrap | object | *No description.* | +| SkipStaticRoleImportRotation | object | *No description.* | | Starttls | object | *No description.* | | Upndomain | string | *No description.* | | Url | string | *No description.* | @@ -1059,16 +1059,6 @@ public object InsecureTlsInput { get; } --- -##### `LengthInput`Optional - -```csharp -public double LengthInput { get; } -``` - -- *Type:* double - ---- - ##### `LocalInput`Optional ```csharp @@ -1159,6 +1149,16 @@ public object SealWrapInput { get; } --- +##### `SkipStaticRoleImportRotationInput`Optional + +```csharp +public object SkipStaticRoleImportRotationInput { get; } +``` + +- *Type:* object + +--- + ##### `StarttlsInput`Optional ```csharp @@ -1359,16 +1359,6 @@ public object InsecureTls { get; } --- -##### `Length`Required - -```csharp -public double Length { get; } -``` - -- *Type:* double - ---- - ##### `Local`Required ```csharp @@ -1459,6 +1449,16 @@ public object SealWrap { get; } --- +##### `SkipStaticRoleImportRotation`Required + +```csharp +public object SkipStaticRoleImportRotation { get; } +``` + +- *Type:* object + +--- + ##### `Starttls`Required ```csharp @@ -1559,7 +1559,6 @@ new LdapSecretBackendConfig { object ExternalEntropyAccess = null, string Id = null, object InsecureTls = null, - double Length = null, object Local = null, double MaxLeaseTtlSeconds = null, string Namespace = null, @@ -1569,6 +1568,7 @@ new LdapSecretBackendConfig { double RequestTimeout = null, string Schema = null, object SealWrap = null, + object SkipStaticRoleImportRotation = null, object Starttls = null, string Upndomain = null, string Url = null, @@ -1601,9 +1601,8 @@ new LdapSecretBackendConfig { | Description | string | Human-friendly description of the mount. | | DisableRemount | object | If set, opts out of mount migration on path updates. | | ExternalEntropyAccess | object | Enable the secrets engine to access Vault's external entropy source. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | InsecureTls | object | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | -| Length | double | The desired length of passwords that Vault generates. | | Local | object | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for tokens and secrets in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1613,6 +1612,7 @@ new LdapSecretBackendConfig { | RequestTimeout | double | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | | Schema | string | The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. | | SealWrap | object | Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. | +| SkipStaticRoleImportRotation | object | Skip rotation of static role secrets on import. | | Starttls | object | Issue a StartTLS command after establishing unencrypted connection. | | Upndomain | string | Enables userPrincipalDomain login with [username]@UPNDomain. | | Url | string | LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. | @@ -1701,7 +1701,7 @@ public string Binddn { get; set; } Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -1715,7 +1715,7 @@ public string Bindpass { get; set; } LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -1729,7 +1729,7 @@ public string[] AllowedManagedKeys { get; set; } List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -1743,7 +1743,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -1757,7 +1757,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -1771,7 +1771,7 @@ public string Certificate { get; set; } CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -1785,7 +1785,7 @@ public string ClientTlsCert { get; set; } Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -1799,7 +1799,7 @@ public string ClientTlsKey { get; set; } Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -1813,7 +1813,7 @@ public double ConnectionTimeout { get; set; } Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -1827,7 +1827,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -1841,7 +1841,7 @@ public string Description { get; set; } Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -1855,7 +1855,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -1869,7 +1869,7 @@ public object ExternalEntropyAccess { get; set; } Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -1881,7 +1881,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1898,21 +1898,7 @@ public object InsecureTls { get; set; } Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} - ---- - -##### `Length`Optional - -```csharp -public double Length { get; set; } -``` - -- *Type:* double - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#length LdapSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -1926,7 +1912,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -1940,7 +1926,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -1954,7 +1940,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -1968,7 +1954,7 @@ public System.Collections.Generic.IDictionary Options { get; set Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -1982,7 +1968,7 @@ public string PasswordPolicy { get; set; } Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -1996,7 +1982,7 @@ public string Path { get; set; } The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -2010,7 +1996,7 @@ public double RequestTimeout { get; set; } Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -2024,7 +2010,7 @@ public string Schema { get; set; } The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2038,7 +2024,21 @@ public object SealWrap { get; set; } Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} + +--- + +##### `SkipStaticRoleImportRotation`Optional + +```csharp +public object SkipStaticRoleImportRotation { get; set; } +``` + +- *Type:* object + +Skip rotation of static role secrets on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2052,7 +2052,7 @@ public object Starttls { get; set; } Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2066,7 +2066,7 @@ public string Upndomain { get; set; } Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2080,7 +2080,7 @@ public string Url { get; set; } LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2094,7 +2094,7 @@ public string Userattr { get; set; } Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2108,7 +2108,7 @@ public string Userdn { get; set; } LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackend.go.md b/docs/ldapSecretBackend.go.md index 04d60779..7ec89eae 100644 --- a/docs/ldapSecretBackend.go.md +++ b/docs/ldapSecretBackend.go.md @@ -4,12 +4,12 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackend" ldapsecretbackend.NewLdapSecretBackend(scope Construct, id *string, config LdapSecretBackendConfig) LdapSecretBackend ``` @@ -86,7 +86,6 @@ Must be unique amongst siblings in the same scope | ResetExternalEntropyAccess | *No description.* | | ResetId | *No description.* | | ResetInsecureTls | *No description.* | -| ResetLength | *No description.* | | ResetLocal | *No description.* | | ResetMaxLeaseTtlSeconds | *No description.* | | ResetNamespace | *No description.* | @@ -96,6 +95,7 @@ Must be unique amongst siblings in the same scope | ResetRequestTimeout | *No description.* | | ResetSchema | *No description.* | | ResetSealWrap | *No description.* | +| ResetSkipStaticRoleImportRotation | *No description.* | | ResetStarttls | *No description.* | | ResetUpndomain | *No description.* | | ResetUrl | *No description.* | @@ -470,12 +470,6 @@ func ResetId() func ResetInsecureTls() ``` -##### `ResetLength` - -```go -func ResetLength() -``` - ##### `ResetLocal` ```go @@ -530,6 +524,12 @@ func ResetSchema() func ResetSealWrap() ``` +##### `ResetSkipStaticRoleImportRotation` + +```go +func ResetSkipStaticRoleImportRotation() +``` + ##### `ResetStarttls` ```go @@ -574,7 +574,7 @@ func ResetUserdn() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackend" ldapsecretbackend.LdapSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -606,7 +606,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackend" ldapsecretbackend.LdapSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -620,7 +620,7 @@ ldapsecretbackend.LdapSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackend" ldapsecretbackend.LdapSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -634,7 +634,7 @@ ldapsecretbackend.LdapSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackend" ldapsecretbackend.LdapSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -663,7 +663,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -709,7 +709,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | ExternalEntropyAccessInput | interface{} | *No description.* | | IdInput | *string | *No description.* | | InsecureTlsInput | interface{} | *No description.* | -| LengthInput | *f64 | *No description.* | | LocalInput | interface{} | *No description.* | | MaxLeaseTtlSecondsInput | *f64 | *No description.* | | NamespaceInput | *string | *No description.* | @@ -719,6 +718,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | RequestTimeoutInput | *f64 | *No description.* | | SchemaInput | *string | *No description.* | | SealWrapInput | interface{} | *No description.* | +| SkipStaticRoleImportRotationInput | interface{} | *No description.* | | StarttlsInput | interface{} | *No description.* | | UpndomainInput | *string | *No description.* | | UrlInput | *string | *No description.* | @@ -739,7 +739,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | ExternalEntropyAccess | interface{} | *No description.* | | Id | *string | *No description.* | | InsecureTls | interface{} | *No description.* | -| Length | *f64 | *No description.* | | Local | interface{} | *No description.* | | MaxLeaseTtlSeconds | *f64 | *No description.* | | Namespace | *string | *No description.* | @@ -749,6 +748,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | RequestTimeout | *f64 | *No description.* | | Schema | *string | *No description.* | | SealWrap | interface{} | *No description.* | +| SkipStaticRoleImportRotation | interface{} | *No description.* | | Starttls | interface{} | *No description.* | | Upndomain | *string | *No description.* | | Url | *string | *No description.* | @@ -1059,16 +1059,6 @@ func InsecureTlsInput() interface{} --- -##### `LengthInput`Optional - -```go -func LengthInput() *f64 -``` - -- *Type:* *f64 - ---- - ##### `LocalInput`Optional ```go @@ -1159,6 +1149,16 @@ func SealWrapInput() interface{} --- +##### `SkipStaticRoleImportRotationInput`Optional + +```go +func SkipStaticRoleImportRotationInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `StarttlsInput`Optional ```go @@ -1359,16 +1359,6 @@ func InsecureTls() interface{} --- -##### `Length`Required - -```go -func Length() *f64 -``` - -- *Type:* *f64 - ---- - ##### `Local`Required ```go @@ -1459,6 +1449,16 @@ func SealWrap() interface{} --- +##### `SkipStaticRoleImportRotation`Required + +```go +func SkipStaticRoleImportRotation() interface{} +``` + +- *Type:* interface{} + +--- + ##### `Starttls`Required ```go @@ -1534,7 +1534,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackend" &ldapsecretbackend.LdapSecretBackendConfig { Connection: interface{}, @@ -1559,7 +1559,6 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" ExternalEntropyAccess: interface{}, Id: *string, InsecureTls: interface{}, - Length: *f64, Local: interface{}, MaxLeaseTtlSeconds: *f64, Namespace: *string, @@ -1569,6 +1568,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" RequestTimeout: *f64, Schema: *string, SealWrap: interface{}, + SkipStaticRoleImportRotation: interface{}, Starttls: interface{}, Upndomain: *string, Url: *string, @@ -1601,9 +1601,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" | Description | *string | Human-friendly description of the mount. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | | ExternalEntropyAccess | interface{} | Enable the secrets engine to access Vault's external entropy source. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | InsecureTls | interface{} | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | -| Length | *f64 | The desired length of passwords that Vault generates. | | Local | interface{} | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for tokens and secrets in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1613,6 +1612,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackend" | RequestTimeout | *f64 | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | | Schema | *string | The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. | | SealWrap | interface{} | Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. | +| SkipStaticRoleImportRotation | interface{} | Skip rotation of static role secrets on import. | | Starttls | interface{} | Issue a StartTLS command after establishing unencrypted connection. | | Upndomain | *string | Enables userPrincipalDomain login with [username]@UPNDomain. | | Url | *string | LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. | @@ -1701,7 +1701,7 @@ Binddn *string Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -1715,7 +1715,7 @@ Bindpass *string LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -1729,7 +1729,7 @@ AllowedManagedKeys *[]*string List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -1743,7 +1743,7 @@ AuditNonHmacRequestKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -1757,7 +1757,7 @@ AuditNonHmacResponseKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -1771,7 +1771,7 @@ Certificate *string CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -1785,7 +1785,7 @@ ClientTlsCert *string Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -1799,7 +1799,7 @@ ClientTlsKey *string Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -1813,7 +1813,7 @@ ConnectionTimeout *f64 Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -1827,7 +1827,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -1841,7 +1841,7 @@ Description *string Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -1855,7 +1855,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -1869,7 +1869,7 @@ ExternalEntropyAccess interface{} Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -1881,7 +1881,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1898,21 +1898,7 @@ InsecureTls interface{} Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} - ---- - -##### `Length`Optional - -```go -Length *f64 -``` - -- *Type:* *f64 - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#length LdapSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -1926,7 +1912,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -1940,7 +1926,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -1954,7 +1940,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -1968,7 +1954,7 @@ Options *map[string]*string Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -1982,7 +1968,7 @@ PasswordPolicy *string Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -1996,7 +1982,7 @@ Path *string The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -2010,7 +1996,7 @@ RequestTimeout *f64 Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -2024,7 +2010,7 @@ Schema *string The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2038,7 +2024,21 @@ SealWrap interface{} Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} + +--- + +##### `SkipStaticRoleImportRotation`Optional + +```go +SkipStaticRoleImportRotation interface{} +``` + +- *Type:* interface{} + +Skip rotation of static role secrets on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2052,7 +2052,7 @@ Starttls interface{} Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2066,7 +2066,7 @@ Upndomain *string Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2080,7 +2080,7 @@ Url *string LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2094,7 +2094,7 @@ Userattr *string Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2108,7 +2108,7 @@ Userdn *string LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackend.java.md b/docs/ldapSecretBackend.java.md index f000182d..89657c93 100644 --- a/docs/ldapSecretBackend.java.md +++ b/docs/ldapSecretBackend.java.md @@ -4,7 +4,7 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers @@ -41,7 +41,6 @@ LdapSecretBackend.Builder.create(Construct scope, java.lang.String id) // .id(java.lang.String) // .insecureTls(java.lang.Boolean) // .insecureTls(IResolvable) -// .length(java.lang.Number) // .local(java.lang.Boolean) // .local(IResolvable) // .maxLeaseTtlSeconds(java.lang.Number) @@ -53,6 +52,8 @@ LdapSecretBackend.Builder.create(Construct scope, java.lang.String id) // .schema(java.lang.String) // .sealWrap(java.lang.Boolean) // .sealWrap(IResolvable) +// .skipStaticRoleImportRotation(java.lang.Boolean) +// .skipStaticRoleImportRotation(IResolvable) // .starttls(java.lang.Boolean) // .starttls(IResolvable) // .upndomain(java.lang.String) @@ -86,9 +87,8 @@ LdapSecretBackend.Builder.create(Construct scope, java.lang.String id) | description | java.lang.String | Human-friendly description of the mount. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | -| length | java.lang.Number | The desired length of passwords that Vault generates. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -98,6 +98,7 @@ LdapSecretBackend.Builder.create(Construct scope, java.lang.String id) | requestTimeout | java.lang.Number | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | | schema | java.lang.String | The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. | | sealWrap | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. | +| skipStaticRoleImportRotation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip rotation of static role secrets on import. | | starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Issue a StartTLS command after establishing unencrypted connection. | | upndomain | java.lang.String | Enables userPrincipalDomain login with [username]@UPNDomain. | | url | java.lang.String | LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. | @@ -172,7 +173,7 @@ Must be unique amongst siblings in the same scope Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -182,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -192,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -202,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -212,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -222,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -232,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -242,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -252,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -262,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -272,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -282,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -292,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -300,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -313,17 +314,7 @@ If you experience problems setting this value it might not be settable. Please t Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} - ---- - -##### `length`Optional - -- *Type:* java.lang.Number - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#length LdapSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -333,7 +324,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -343,7 +334,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -353,7 +344,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -363,7 +354,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -373,7 +364,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -383,7 +374,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -393,7 +384,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -403,7 +394,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -413,7 +404,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} + +--- + +##### `skipStaticRoleImportRotation`Optional + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Skip rotation of static role secrets on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -423,7 +424,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -433,7 +434,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -443,7 +444,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -453,7 +454,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -463,7 +464,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- @@ -507,7 +508,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetExternalEntropyAccess | *No description.* | | resetId | *No description.* | | resetInsecureTls | *No description.* | -| resetLength | *No description.* | | resetLocal | *No description.* | | resetMaxLeaseTtlSeconds | *No description.* | | resetNamespace | *No description.* | @@ -517,6 +517,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetRequestTimeout | *No description.* | | resetSchema | *No description.* | | resetSealWrap | *No description.* | +| resetSkipStaticRoleImportRotation | *No description.* | | resetStarttls | *No description.* | | resetUpndomain | *No description.* | | resetUrl | *No description.* | @@ -893,12 +894,6 @@ public void resetId() public void resetInsecureTls() ``` -##### `resetLength` - -```java -public void resetLength() -``` - ##### `resetLocal` ```java @@ -953,6 +948,12 @@ public void resetSchema() public void resetSealWrap() ``` +##### `resetSkipStaticRoleImportRotation` + +```java +public void resetSkipStaticRoleImportRotation() +``` + ##### `resetStarttls` ```java @@ -1086,7 +1087,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1132,7 +1133,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | externalEntropyAccessInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | idInput | java.lang.String | *No description.* | | insecureTlsInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | -| lengthInput | java.lang.Number | *No description.* | | localInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | maxLeaseTtlSecondsInput | java.lang.Number | *No description.* | | namespaceInput | java.lang.String | *No description.* | @@ -1142,6 +1142,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | requestTimeoutInput | java.lang.Number | *No description.* | | schemaInput | java.lang.String | *No description.* | | sealWrapInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | +| skipStaticRoleImportRotationInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | starttlsInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | upndomainInput | java.lang.String | *No description.* | | urlInput | java.lang.String | *No description.* | @@ -1162,7 +1163,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | id | java.lang.String | *No description.* | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | -| length | java.lang.Number | *No description.* | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | maxLeaseTtlSeconds | java.lang.Number | *No description.* | | namespace | java.lang.String | *No description.* | @@ -1172,6 +1172,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | requestTimeout | java.lang.Number | *No description.* | | schema | java.lang.String | *No description.* | | sealWrap | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | +| skipStaticRoleImportRotation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | upndomain | java.lang.String | *No description.* | | url | java.lang.String | *No description.* | @@ -1482,16 +1483,6 @@ public java.lang.Object getInsecureTlsInput(); --- -##### `lengthInput`Optional - -```java -public java.lang.Number getLengthInput(); -``` - -- *Type:* java.lang.Number - ---- - ##### `localInput`Optional ```java @@ -1582,6 +1573,16 @@ public java.lang.Object getSealWrapInput(); --- +##### `skipStaticRoleImportRotationInput`Optional + +```java +public java.lang.Object getSkipStaticRoleImportRotationInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `starttlsInput`Optional ```java @@ -1782,16 +1783,6 @@ public java.lang.Object getInsecureTls(); --- -##### `length`Required - -```java -public java.lang.Number getLength(); -``` - -- *Type:* java.lang.Number - ---- - ##### `local`Required ```java @@ -1882,6 +1873,16 @@ public java.lang.Object getSealWrap(); --- +##### `skipStaticRoleImportRotation`Required + +```java +public java.lang.Object getSkipStaticRoleImportRotation(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `starttls`Required ```java @@ -1989,7 +1990,6 @@ LdapSecretBackendConfig.builder() // .id(java.lang.String) // .insecureTls(java.lang.Boolean) // .insecureTls(IResolvable) -// .length(java.lang.Number) // .local(java.lang.Boolean) // .local(IResolvable) // .maxLeaseTtlSeconds(java.lang.Number) @@ -2001,6 +2001,8 @@ LdapSecretBackendConfig.builder() // .schema(java.lang.String) // .sealWrap(java.lang.Boolean) // .sealWrap(IResolvable) +// .skipStaticRoleImportRotation(java.lang.Boolean) +// .skipStaticRoleImportRotation(IResolvable) // .starttls(java.lang.Boolean) // .starttls(IResolvable) // .upndomain(java.lang.String) @@ -2034,9 +2036,8 @@ LdapSecretBackendConfig.builder() | description | java.lang.String | Human-friendly description of the mount. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | -| length | java.lang.Number | The desired length of passwords that Vault generates. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -2046,6 +2047,7 @@ LdapSecretBackendConfig.builder() | requestTimeout | java.lang.Number | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | | schema | java.lang.String | The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. | | sealWrap | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. | +| skipStaticRoleImportRotation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip rotation of static role secrets on import. | | starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Issue a StartTLS command after establishing unencrypted connection. | | upndomain | java.lang.String | Enables userPrincipalDomain login with [username]@UPNDomain. | | url | java.lang.String | LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. | @@ -2134,7 +2136,7 @@ public java.lang.String getBinddn(); Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -2148,7 +2150,7 @@ public java.lang.String getBindpass(); LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -2162,7 +2164,7 @@ public java.util.List getAllowedManagedKeys(); List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -2176,7 +2178,7 @@ public java.util.List getAuditNonHmacRequestKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -2190,7 +2192,7 @@ public java.util.List getAuditNonHmacResponseKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -2204,7 +2206,7 @@ public java.lang.String getCertificate(); CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -2218,7 +2220,7 @@ public java.lang.String getClientTlsCert(); Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -2232,7 +2234,7 @@ public java.lang.String getClientTlsKey(); Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -2246,7 +2248,7 @@ public java.lang.Number getConnectionTimeout(); Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -2260,7 +2262,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -2274,7 +2276,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -2288,7 +2290,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -2302,7 +2304,7 @@ public java.lang.Object getExternalEntropyAccess(); Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -2314,7 +2316,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2331,21 +2333,7 @@ public java.lang.Object getInsecureTls(); Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} - ---- - -##### `length`Optional - -```java -public java.lang.Number getLength(); -``` - -- *Type:* java.lang.Number - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#length LdapSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -2359,7 +2347,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -2373,7 +2361,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -2387,7 +2375,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -2401,7 +2389,7 @@ public java.util.Map getOptions(); Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -2415,7 +2403,7 @@ public java.lang.String getPasswordPolicy(); Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -2429,7 +2417,7 @@ public java.lang.String getPath(); The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -2443,7 +2431,7 @@ public java.lang.Number getRequestTimeout(); Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -2457,7 +2445,7 @@ public java.lang.String getSchema(); The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2471,7 +2459,21 @@ public java.lang.Object getSealWrap(); Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} + +--- + +##### `skipStaticRoleImportRotation`Optional + +```java +public java.lang.Object getSkipStaticRoleImportRotation(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Skip rotation of static role secrets on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2485,7 +2487,7 @@ public java.lang.Object getStarttls(); Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2499,7 +2501,7 @@ public java.lang.String getUpndomain(); Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2513,7 +2515,7 @@ public java.lang.String getUrl(); LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2527,7 +2529,7 @@ public java.lang.String getUserattr(); Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2541,7 +2543,7 @@ public java.lang.String getUserdn(); LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackend.python.md b/docs/ldapSecretBackend.python.md index 14498357..efbc5514 100644 --- a/docs/ldapSecretBackend.python.md +++ b/docs/ldapSecretBackend.python.md @@ -4,7 +4,7 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers @@ -36,7 +36,6 @@ ldapSecretBackend.LdapSecretBackend( external_entropy_access: typing.Union[bool, IResolvable] = None, id: str = None, insecure_tls: typing.Union[bool, IResolvable] = None, - length: typing.Union[int, float] = None, local: typing.Union[bool, IResolvable] = None, max_lease_ttl_seconds: typing.Union[int, float] = None, namespace: str = None, @@ -46,6 +45,7 @@ ldapSecretBackend.LdapSecretBackend( request_timeout: typing.Union[int, float] = None, schema: str = None, seal_wrap: typing.Union[bool, IResolvable] = None, + skip_static_role_import_rotation: typing.Union[bool, IResolvable] = None, starttls: typing.Union[bool, IResolvable] = None, upndomain: str = None, url: str = None, @@ -78,9 +78,8 @@ ldapSecretBackend.LdapSecretBackend( | description | str | Human-friendly description of the mount. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | -| length | typing.Union[int, float] | The desired length of passwords that Vault generates. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -90,6 +89,7 @@ ldapSecretBackend.LdapSecretBackend( | request_timeout | typing.Union[int, float] | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | | schema | str | The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. | | seal_wrap | typing.Union[bool, cdktf.IResolvable] | Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. | +| skip_static_role_import_rotation | typing.Union[bool, cdktf.IResolvable] | Skip rotation of static role secrets on import. | | starttls | typing.Union[bool, cdktf.IResolvable] | Issue a StartTLS command after establishing unencrypted connection. | | upndomain | str | Enables userPrincipalDomain login with [username]@UPNDomain. | | url | str | LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. | @@ -164,7 +164,7 @@ Must be unique amongst siblings in the same scope Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -224,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -244,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -264,7 +264,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -274,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -284,7 +284,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -305,17 +305,7 @@ If you experience problems setting this value it might not be settable. Please t Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} - ---- - -##### `length`Optional - -- *Type:* typing.Union[int, float] - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#length LdapSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -325,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -335,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -345,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -355,7 +345,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -365,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -375,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -385,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -395,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -405,7 +395,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} + +--- + +##### `skip_static_role_import_rotation`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Skip rotation of static role secrets on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -415,7 +415,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -425,7 +425,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -435,7 +435,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -445,7 +445,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -455,7 +455,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- @@ -499,7 +499,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_external_entropy_access | *No description.* | | reset_id | *No description.* | | reset_insecure_tls | *No description.* | -| reset_length | *No description.* | | reset_local | *No description.* | | reset_max_lease_ttl_seconds | *No description.* | | reset_namespace | *No description.* | @@ -509,6 +508,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_request_timeout | *No description.* | | reset_schema | *No description.* | | reset_seal_wrap | *No description.* | +| reset_skip_static_role_import_rotation | *No description.* | | reset_starttls | *No description.* | | reset_upndomain | *No description.* | | reset_url | *No description.* | @@ -920,12 +920,6 @@ def reset_id() -> None def reset_insecure_tls() -> None ``` -##### `reset_length` - -```python -def reset_length() -> None -``` - ##### `reset_local` ```python @@ -980,6 +974,12 @@ def reset_schema() -> None def reset_seal_wrap() -> None ``` +##### `reset_skip_static_role_import_rotation` + +```python +def reset_skip_static_role_import_rotation() -> None +``` + ##### `reset_starttls` ```python @@ -1124,7 +1124,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1170,7 +1170,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | external_entropy_access_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | id_input | str | *No description.* | | insecure_tls_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | -| length_input | typing.Union[int, float] | *No description.* | | local_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | max_lease_ttl_seconds_input | typing.Union[int, float] | *No description.* | | namespace_input | str | *No description.* | @@ -1180,6 +1179,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | request_timeout_input | typing.Union[int, float] | *No description.* | | schema_input | str | *No description.* | | seal_wrap_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | +| skip_static_role_import_rotation_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | starttls_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | upndomain_input | str | *No description.* | | url_input | str | *No description.* | @@ -1200,7 +1200,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | *No description.* | | id | str | *No description.* | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | *No description.* | -| length | typing.Union[int, float] | *No description.* | | local | typing.Union[bool, cdktf.IResolvable] | *No description.* | | max_lease_ttl_seconds | typing.Union[int, float] | *No description.* | | namespace | str | *No description.* | @@ -1210,6 +1209,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | request_timeout | typing.Union[int, float] | *No description.* | | schema | str | *No description.* | | seal_wrap | typing.Union[bool, cdktf.IResolvable] | *No description.* | +| skip_static_role_import_rotation | typing.Union[bool, cdktf.IResolvable] | *No description.* | | starttls | typing.Union[bool, cdktf.IResolvable] | *No description.* | | upndomain | str | *No description.* | | url | str | *No description.* | @@ -1520,16 +1520,6 @@ insecure_tls_input: typing.Union[bool, IResolvable] --- -##### `length_input`Optional - -```python -length_input: typing.Union[int, float] -``` - -- *Type:* typing.Union[int, float] - ---- - ##### `local_input`Optional ```python @@ -1620,6 +1610,16 @@ seal_wrap_input: typing.Union[bool, IResolvable] --- +##### `skip_static_role_import_rotation_input`Optional + +```python +skip_static_role_import_rotation_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `starttls_input`Optional ```python @@ -1820,16 +1820,6 @@ insecure_tls: typing.Union[bool, IResolvable] --- -##### `length`Required - -```python -length: typing.Union[int, float] -``` - -- *Type:* typing.Union[int, float] - ---- - ##### `local`Required ```python @@ -1920,6 +1910,16 @@ seal_wrap: typing.Union[bool, IResolvable] --- +##### `skip_static_role_import_rotation`Required + +```python +skip_static_role_import_rotation: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `starttls`Required ```python @@ -2020,7 +2020,6 @@ ldapSecretBackend.LdapSecretBackendConfig( external_entropy_access: typing.Union[bool, IResolvable] = None, id: str = None, insecure_tls: typing.Union[bool, IResolvable] = None, - length: typing.Union[int, float] = None, local: typing.Union[bool, IResolvable] = None, max_lease_ttl_seconds: typing.Union[int, float] = None, namespace: str = None, @@ -2030,6 +2029,7 @@ ldapSecretBackend.LdapSecretBackendConfig( request_timeout: typing.Union[int, float] = None, schema: str = None, seal_wrap: typing.Union[bool, IResolvable] = None, + skip_static_role_import_rotation: typing.Union[bool, IResolvable] = None, starttls: typing.Union[bool, IResolvable] = None, upndomain: str = None, url: str = None, @@ -2062,9 +2062,8 @@ ldapSecretBackend.LdapSecretBackendConfig( | description | str | Human-friendly description of the mount. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | -| length | typing.Union[int, float] | The desired length of passwords that Vault generates. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -2074,6 +2073,7 @@ ldapSecretBackend.LdapSecretBackendConfig( | request_timeout | typing.Union[int, float] | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | | schema | str | The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. | | seal_wrap | typing.Union[bool, cdktf.IResolvable] | Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. | +| skip_static_role_import_rotation | typing.Union[bool, cdktf.IResolvable] | Skip rotation of static role secrets on import. | | starttls | typing.Union[bool, cdktf.IResolvable] | Issue a StartTLS command after establishing unencrypted connection. | | upndomain | str | Enables userPrincipalDomain login with [username]@UPNDomain. | | url | str | LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. | @@ -2162,7 +2162,7 @@ binddn: str Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -2176,7 +2176,7 @@ bindpass: str LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -2190,7 +2190,7 @@ allowed_managed_keys: typing.List[str] List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -2204,7 +2204,7 @@ audit_non_hmac_request_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -2218,7 +2218,7 @@ audit_non_hmac_response_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -2232,7 +2232,7 @@ certificate: str CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -2246,7 +2246,7 @@ client_tls_cert: str Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -2260,7 +2260,7 @@ client_tls_key: str Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -2274,7 +2274,7 @@ connection_timeout: typing.Union[int, float] Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -2288,7 +2288,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -2302,7 +2302,7 @@ description: str Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -2316,7 +2316,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -2330,7 +2330,7 @@ external_entropy_access: typing.Union[bool, IResolvable] Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -2342,7 +2342,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2359,21 +2359,7 @@ insecure_tls: typing.Union[bool, IResolvable] Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} - ---- - -##### `length`Optional - -```python -length: typing.Union[int, float] -``` - -- *Type:* typing.Union[int, float] - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#length LdapSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -2387,7 +2373,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -2401,7 +2387,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -2415,7 +2401,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -2429,7 +2415,7 @@ options: typing.Mapping[str] Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -2443,7 +2429,7 @@ password_policy: str Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -2457,7 +2443,7 @@ path: str The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -2471,7 +2457,7 @@ request_timeout: typing.Union[int, float] Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -2485,7 +2471,7 @@ schema: str The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2499,7 +2485,21 @@ seal_wrap: typing.Union[bool, IResolvable] Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} + +--- + +##### `skip_static_role_import_rotation`Optional + +```python +skip_static_role_import_rotation: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Skip rotation of static role secrets on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2513,7 +2513,7 @@ starttls: typing.Union[bool, IResolvable] Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2527,7 +2527,7 @@ upndomain: str Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2541,7 +2541,7 @@ url: str LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2555,7 +2555,7 @@ userattr: str Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2569,7 +2569,7 @@ userdn: str LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackend.typescript.md b/docs/ldapSecretBackend.typescript.md index acd5afdf..864f02df 100644 --- a/docs/ldapSecretBackend.typescript.md +++ b/docs/ldapSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers @@ -86,7 +86,6 @@ Must be unique amongst siblings in the same scope | resetExternalEntropyAccess | *No description.* | | resetId | *No description.* | | resetInsecureTls | *No description.* | -| resetLength | *No description.* | | resetLocal | *No description.* | | resetMaxLeaseTtlSeconds | *No description.* | | resetNamespace | *No description.* | @@ -96,6 +95,7 @@ Must be unique amongst siblings in the same scope | resetRequestTimeout | *No description.* | | resetSchema | *No description.* | | resetSealWrap | *No description.* | +| resetSkipStaticRoleImportRotation | *No description.* | | resetStarttls | *No description.* | | resetUpndomain | *No description.* | | resetUrl | *No description.* | @@ -470,12 +470,6 @@ public resetId(): void public resetInsecureTls(): void ``` -##### `resetLength` - -```typescript -public resetLength(): void -``` - ##### `resetLocal` ```typescript @@ -530,6 +524,12 @@ public resetSchema(): void public resetSealWrap(): void ``` +##### `resetSkipStaticRoleImportRotation` + +```typescript +public resetSkipStaticRoleImportRotation(): void +``` + ##### `resetStarttls` ```typescript @@ -663,7 +663,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -709,7 +709,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | externalEntropyAccessInput | boolean \| cdktf.IResolvable | *No description.* | | idInput | string | *No description.* | | insecureTlsInput | boolean \| cdktf.IResolvable | *No description.* | -| lengthInput | number | *No description.* | | localInput | boolean \| cdktf.IResolvable | *No description.* | | maxLeaseTtlSecondsInput | number | *No description.* | | namespaceInput | string | *No description.* | @@ -719,6 +718,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | requestTimeoutInput | number | *No description.* | | schemaInput | string | *No description.* | | sealWrapInput | boolean \| cdktf.IResolvable | *No description.* | +| skipStaticRoleImportRotationInput | boolean \| cdktf.IResolvable | *No description.* | | starttlsInput | boolean \| cdktf.IResolvable | *No description.* | | upndomainInput | string | *No description.* | | urlInput | string | *No description.* | @@ -739,7 +739,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | externalEntropyAccess | boolean \| cdktf.IResolvable | *No description.* | | id | string | *No description.* | | insecureTls | boolean \| cdktf.IResolvable | *No description.* | -| length | number | *No description.* | | local | boolean \| cdktf.IResolvable | *No description.* | | maxLeaseTtlSeconds | number | *No description.* | | namespace | string | *No description.* | @@ -749,6 +748,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | requestTimeout | number | *No description.* | | schema | string | *No description.* | | sealWrap | boolean \| cdktf.IResolvable | *No description.* | +| skipStaticRoleImportRotation | boolean \| cdktf.IResolvable | *No description.* | | starttls | boolean \| cdktf.IResolvable | *No description.* | | upndomain | string | *No description.* | | url | string | *No description.* | @@ -1059,16 +1059,6 @@ public readonly insecureTlsInput: boolean | IResolvable; --- -##### `lengthInput`Optional - -```typescript -public readonly lengthInput: number; -``` - -- *Type:* number - ---- - ##### `localInput`Optional ```typescript @@ -1159,6 +1149,16 @@ public readonly sealWrapInput: boolean | IResolvable; --- +##### `skipStaticRoleImportRotationInput`Optional + +```typescript +public readonly skipStaticRoleImportRotationInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `starttlsInput`Optional ```typescript @@ -1359,16 +1359,6 @@ public readonly insecureTls: boolean | IResolvable; --- -##### `length`Required - -```typescript -public readonly length: number; -``` - -- *Type:* number - ---- - ##### `local`Required ```typescript @@ -1459,6 +1449,16 @@ public readonly sealWrap: boolean | IResolvable; --- +##### `skipStaticRoleImportRotation`Required + +```typescript +public readonly skipStaticRoleImportRotation: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `starttls`Required ```typescript @@ -1563,9 +1563,8 @@ const ldapSecretBackendConfig: ldapSecretBackend.LdapSecretBackendConfig = { ... | description | string | Human-friendly description of the mount. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | | externalEntropyAccess | boolean \| cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | insecureTls | boolean \| cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | -| length | number | The desired length of passwords that Vault generates. | | local | boolean \| cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1575,6 +1574,7 @@ const ldapSecretBackendConfig: ldapSecretBackend.LdapSecretBackendConfig = { ... | requestTimeout | number | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | | schema | string | The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. | | sealWrap | boolean \| cdktf.IResolvable | Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. | +| skipStaticRoleImportRotation | boolean \| cdktf.IResolvable | Skip rotation of static role secrets on import. | | starttls | boolean \| cdktf.IResolvable | Issue a StartTLS command after establishing unencrypted connection. | | upndomain | string | Enables userPrincipalDomain login with [username]@UPNDomain. | | url | string | LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. | @@ -1663,7 +1663,7 @@ public readonly binddn: string; Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -1677,7 +1677,7 @@ public readonly bindpass: string; LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -1691,7 +1691,7 @@ public readonly allowedManagedKeys: string[]; List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -1705,7 +1705,7 @@ public readonly auditNonHmacRequestKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -1719,7 +1719,7 @@ public readonly auditNonHmacResponseKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -1733,7 +1733,7 @@ public readonly certificate: string; CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -1747,7 +1747,7 @@ public readonly clientTlsCert: string; Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -1761,7 +1761,7 @@ public readonly clientTlsKey: string; Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -1775,7 +1775,7 @@ public readonly connectionTimeout: number; Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -1789,7 +1789,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -1803,7 +1803,7 @@ public readonly description: string; Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -1817,7 +1817,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -1831,7 +1831,7 @@ public readonly externalEntropyAccess: boolean | IResolvable; Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -1843,7 +1843,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1860,21 +1860,7 @@ public readonly insecureTls: boolean | IResolvable; Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} - ---- - -##### `length`Optional - -```typescript -public readonly length: number; -``` - -- *Type:* number - -The desired length of passwords that Vault generates. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#length LdapSecretBackend#length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -1888,7 +1874,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -1902,7 +1888,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -1916,7 +1902,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -1930,7 +1916,7 @@ public readonly options: {[ key: string ]: string}; Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -1944,7 +1930,7 @@ public readonly passwordPolicy: string; Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -1958,7 +1944,7 @@ public readonly path: string; The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -1972,7 +1958,7 @@ public readonly requestTimeout: number; Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -1986,7 +1972,7 @@ public readonly schema: string; The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2000,7 +1986,21 @@ public readonly sealWrap: boolean | IResolvable; Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} + +--- + +##### `skipStaticRoleImportRotation`Optional + +```typescript +public readonly skipStaticRoleImportRotation: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Skip rotation of static role secrets on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2014,7 +2014,7 @@ public readonly starttls: boolean | IResolvable; Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2028,7 +2028,7 @@ public readonly upndomain: string; Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2042,7 +2042,7 @@ public readonly url: string; LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2056,7 +2056,7 @@ public readonly userattr: string; Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2070,7 +2070,7 @@ public readonly userdn: string; LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackendDynamicRole.csharp.md b/docs/ldapSecretBackendDynamicRole.csharp.md index 436e54e4..afd5c3a6 100644 --- a/docs/ldapSecretBackendDynamicRole.csharp.md +++ b/docs/ldapSecretBackendDynamicRole.csharp.md @@ -4,7 +4,7 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -974,7 +974,7 @@ new LdapSecretBackendDynamicRoleConfig { | DeletionLdif | string | A templatized LDIF string used to delete the user account once its TTL has expired. | | RoleName | string | Name of the role. | | DefaultTtl | double | Specifies the TTL for the leases associated with this role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | MaxTtl | double | Specifies the maximum TTL for the leases associated with this role. | | Mount | string | The path where the LDAP secrets backend is mounted. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1063,7 +1063,7 @@ public string CreationLdif { get; set; } A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1079,7 +1079,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1093,7 +1093,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1107,7 +1107,7 @@ public double DefaultTtl { get; set; } Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1119,7 +1119,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ public double MaxTtl { get; set; } Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1150,7 +1150,7 @@ public string Mount { get; set; } The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1164,7 +1164,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1180,7 +1180,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1196,7 +1196,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendDynamicRole.go.md b/docs/ldapSecretBackendDynamicRole.go.md index b32df486..71b13526 100644 --- a/docs/ldapSecretBackendDynamicRole.go.md +++ b/docs/ldapSecretBackendDynamicRole.go.md @@ -4,12 +4,12 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.NewLdapSecretBackendDynamicRole(scope Construct, id *string, config LdapSecretBackendDynamicRoleConfig) LdapSecretBackendDynamicRole ``` @@ -427,7 +427,7 @@ func ResetUsernameTemplate() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsConstruct(x interface{}) *bool ``` @@ -459,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +473,7 @@ ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsTerraformElement(x i ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +487,7 @@ ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_IsTerraformResource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackenddynamicrole" ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -516,7 +516,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -936,7 +936,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddynamicrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackenddynamicrole" &ldapsecretbackenddynamicrole.LdapSecretBackendDynamicRoleConfig { Connection: interface{}, @@ -974,7 +974,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackenddyna | DeletionLdif | *string | A templatized LDIF string used to delete the user account once its TTL has expired. | | RoleName | *string | Name of the role. | | DefaultTtl | *f64 | Specifies the TTL for the leases associated with this role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | MaxTtl | *f64 | Specifies the maximum TTL for the leases associated with this role. | | Mount | *string | The path where the LDAP secrets backend is mounted. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1063,7 +1063,7 @@ CreationLdif *string A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1079,7 +1079,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1093,7 +1093,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1107,7 +1107,7 @@ DefaultTtl *f64 Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1119,7 +1119,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ MaxTtl *f64 Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1150,7 +1150,7 @@ Mount *string The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1164,7 +1164,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1180,7 +1180,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1196,7 +1196,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendDynamicRole.java.md b/docs/ldapSecretBackendDynamicRole.java.md index 893477ba..4c95e635 100644 --- a/docs/ldapSecretBackendDynamicRole.java.md +++ b/docs/ldapSecretBackendDynamicRole.java.md @@ -4,7 +4,7 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers @@ -51,7 +51,7 @@ LdapSecretBackendDynamicRole.Builder.create(Construct scope, java.lang.String id | deletionLdif | java.lang.String | A templatized LDIF string used to delete the user account once its TTL has expired. | | roleName | java.lang.String | Name of the role. | | defaultTtl | java.lang.Number | Specifies the TTL for the leases associated with this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | maxTtl | java.lang.Number | Specifies the maximum TTL for the leases associated with this role. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -138,7 +138,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -211,7 +211,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -223,7 +223,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- @@ -699,7 +699,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -1161,7 +1161,7 @@ LdapSecretBackendDynamicRoleConfig.builder() | deletionLdif | java.lang.String | A templatized LDIF string used to delete the user account once its TTL has expired. | | roleName | java.lang.String | Name of the role. | | defaultTtl | java.lang.Number | Specifies the TTL for the leases associated with this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | maxTtl | java.lang.Number | Specifies the maximum TTL for the leases associated with this role. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1250,7 +1250,7 @@ public java.lang.String getCreationLdif(); A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1266,7 +1266,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1280,7 +1280,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1294,7 +1294,7 @@ public java.lang.Number getDefaultTtl(); Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1306,7 +1306,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1323,7 +1323,7 @@ public java.lang.Number getMaxTtl(); Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1337,7 +1337,7 @@ public java.lang.String getMount(); The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1351,7 +1351,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1367,7 +1367,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1383,7 +1383,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendDynamicRole.python.md b/docs/ldapSecretBackendDynamicRole.python.md index e48d4824..87a9fec5 100644 --- a/docs/ldapSecretBackendDynamicRole.python.md +++ b/docs/ldapSecretBackendDynamicRole.python.md @@ -4,7 +4,7 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers @@ -49,7 +49,7 @@ ldapSecretBackendDynamicRole.LdapSecretBackendDynamicRole( | deletion_ldif | str | A templatized LDIF string used to delete the user account once its TTL has expired. | | role_name | str | Name of the role. | | default_ttl | typing.Union[int, float] | Specifies the TTL for the leases associated with this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | max_ttl | typing.Union[int, float] | Specifies the maximum TTL for the leases associated with this role. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -136,7 +136,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -209,7 +209,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -221,7 +221,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- @@ -743,7 +743,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -1201,7 +1201,7 @@ ldapSecretBackendDynamicRole.LdapSecretBackendDynamicRoleConfig( | deletion_ldif | str | A templatized LDIF string used to delete the user account once its TTL has expired. | | role_name | str | Name of the role. | | default_ttl | typing.Union[int, float] | Specifies the TTL for the leases associated with this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | max_ttl | typing.Union[int, float] | Specifies the maximum TTL for the leases associated with this role. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1290,7 +1290,7 @@ creation_ldif: str A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1306,7 +1306,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1320,7 +1320,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1334,7 +1334,7 @@ default_ttl: typing.Union[int, float] Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1346,7 +1346,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1363,7 +1363,7 @@ max_ttl: typing.Union[int, float] Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1377,7 +1377,7 @@ mount: str The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1391,7 +1391,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1407,7 +1407,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1423,7 +1423,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendDynamicRole.typescript.md b/docs/ldapSecretBackendDynamicRole.typescript.md index e088c36c..30c072c5 100644 --- a/docs/ldapSecretBackendDynamicRole.typescript.md +++ b/docs/ldapSecretBackendDynamicRole.typescript.md @@ -4,7 +4,7 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -956,7 +956,7 @@ const ldapSecretBackendDynamicRoleConfig: ldapSecretBackendDynamicRole.LdapSecre | deletionLdif | string | A templatized LDIF string used to delete the user account once its TTL has expired. | | roleName | string | Name of the role. | | defaultTtl | number | Specifies the TTL for the leases associated with this role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | maxTtl | number | Specifies the maximum TTL for the leases associated with this role. | | mount | string | The path where the LDAP secrets backend is mounted. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1045,7 +1045,7 @@ public readonly creationLdif: string; A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1061,7 +1061,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1075,7 +1075,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1089,7 +1089,7 @@ public readonly defaultTtl: number; Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1101,7 +1101,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1118,7 +1118,7 @@ public readonly maxTtl: number; Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1132,7 +1132,7 @@ public readonly mount: string; The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1146,7 +1146,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1162,7 +1162,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1178,7 +1178,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendLibrarySet.csharp.md b/docs/ldapSecretBackendLibrarySet.csharp.md index acb662b5..1dc26446 100644 --- a/docs/ldapSecretBackendLibrarySet.csharp.md +++ b/docs/ldapSecretBackendLibrarySet.csharp.md @@ -4,7 +4,7 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -920,7 +920,7 @@ new LdapSecretBackendLibrarySetConfig { | Name | string | The name of the set of service accounts. | | ServiceAccountNames | string[] | The names of all the service accounts that can be checked out from this set. | | DisableCheckInEnforcement | object | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | MaxTtl | double | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | Mount | string | The path where the LDAP secrets backend is mounted. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1008,7 +1008,7 @@ public string Name { get; set; } The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1022,7 +1022,7 @@ public string[] ServiceAccountNames { get; set; } The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1036,7 +1036,7 @@ public object DisableCheckInEnforcement { get; set; } Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1048,7 +1048,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1067,7 +1067,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1081,7 +1081,7 @@ public string Mount { get; set; } The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1095,7 +1095,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1111,7 +1111,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendLibrarySet.go.md b/docs/ldapSecretBackendLibrarySet.go.md index a0d78413..c2b5a9d8 100644 --- a/docs/ldapSecretBackendLibrarySet.go.md +++ b/docs/ldapSecretBackendLibrarySet.go.md @@ -4,12 +4,12 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.NewLdapSecretBackendLibrarySet(scope Construct, id *string, config LdapSecretBackendLibrarySetConfig) LdapSecretBackendLibrarySet ``` @@ -420,7 +420,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsConstruct(x interface{}) *bool ``` @@ -452,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +466,7 @@ ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +480,7 @@ ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendlibraryset" ldapsecretbackendlibraryset.LdapSecretBackendLibrarySet_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +509,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -885,7 +885,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibraryset" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendlibraryset" &ldapsecretbackendlibraryset.LdapSecretBackendLibrarySetConfig { Connection: interface{}, @@ -920,7 +920,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendlibr | Name | *string | The name of the set of service accounts. | | ServiceAccountNames | *[]*string | The names of all the service accounts that can be checked out from this set. | | DisableCheckInEnforcement | interface{} | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | MaxTtl | *f64 | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | Mount | *string | The path where the LDAP secrets backend is mounted. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1008,7 +1008,7 @@ Name *string The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1022,7 +1022,7 @@ ServiceAccountNames *[]*string The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1036,7 +1036,7 @@ DisableCheckInEnforcement interface{} Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1048,7 +1048,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1067,7 +1067,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1081,7 +1081,7 @@ Mount *string The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1095,7 +1095,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1111,7 +1111,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendLibrarySet.java.md b/docs/ldapSecretBackendLibrarySet.java.md index ea0cb3ee..d7389de5 100644 --- a/docs/ldapSecretBackendLibrarySet.java.md +++ b/docs/ldapSecretBackendLibrarySet.java.md @@ -4,7 +4,7 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers @@ -49,7 +49,7 @@ LdapSecretBackendLibrarySet.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the set of service accounts. | | serviceAccountNames | java.util.List | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | maxTtl | java.lang.Number | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -166,7 +166,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -198,7 +198,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- @@ -667,7 +667,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -1083,7 +1083,7 @@ LdapSecretBackendLibrarySetConfig.builder() | name | java.lang.String | The name of the set of service accounts. | | serviceAccountNames | java.util.List | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | maxTtl | java.lang.Number | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1171,7 +1171,7 @@ public java.lang.String getName(); The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1185,7 +1185,7 @@ public java.util.List getServiceAccountNames(); The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1199,7 +1199,7 @@ public java.lang.Object getDisableCheckInEnforcement(); Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1211,7 +1211,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1230,7 +1230,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1244,7 +1244,7 @@ public java.lang.String getMount(); The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1258,7 +1258,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1274,7 +1274,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendLibrarySet.python.md b/docs/ldapSecretBackendLibrarySet.python.md index eccb230b..9a0a00b2 100644 --- a/docs/ldapSecretBackendLibrarySet.python.md +++ b/docs/ldapSecretBackendLibrarySet.python.md @@ -4,7 +4,7 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers @@ -46,7 +46,7 @@ ldapSecretBackendLibrarySet.LdapSecretBackendLibrarySet( | name | str | The name of the set of service accounts. | | service_account_names | typing.List[str] | The names of all the service accounts that can be checked out from this set. | | disable_check_in_enforcement | typing.Union[bool, cdktf.IResolvable] | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | max_ttl | typing.Union[int, float] | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -195,7 +195,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- @@ -710,7 +710,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -1121,7 +1121,7 @@ ldapSecretBackendLibrarySet.LdapSecretBackendLibrarySetConfig( | name | str | The name of the set of service accounts. | | service_account_names | typing.List[str] | The names of all the service accounts that can be checked out from this set. | | disable_check_in_enforcement | typing.Union[bool, cdktf.IResolvable] | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | max_ttl | typing.Union[int, float] | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1209,7 +1209,7 @@ name: str The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1223,7 +1223,7 @@ service_account_names: typing.List[str] The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1237,7 +1237,7 @@ disable_check_in_enforcement: typing.Union[bool, IResolvable] Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1249,7 +1249,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1268,7 +1268,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1282,7 +1282,7 @@ mount: str The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1296,7 +1296,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1312,7 +1312,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendLibrarySet.typescript.md b/docs/ldapSecretBackendLibrarySet.typescript.md index cad23b0b..d6e4bea8 100644 --- a/docs/ldapSecretBackendLibrarySet.typescript.md +++ b/docs/ldapSecretBackendLibrarySet.typescript.md @@ -4,7 +4,7 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -904,7 +904,7 @@ const ldapSecretBackendLibrarySetConfig: ldapSecretBackendLibrarySet.LdapSecretB | name | string | The name of the set of service accounts. | | serviceAccountNames | string[] | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | boolean \| cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | maxTtl | number | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | string | The path where the LDAP secrets backend is mounted. | | namespace | string | Target namespace. (requires Enterprise). | @@ -992,7 +992,7 @@ public readonly name: string; The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1006,7 +1006,7 @@ public readonly serviceAccountNames: string[]; The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1020,7 +1020,7 @@ public readonly disableCheckInEnforcement: boolean | IResolvable; Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1032,7 +1032,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1051,7 +1051,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1065,7 +1065,7 @@ public readonly mount: string; The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1079,7 +1079,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1095,7 +1095,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendStaticRole.csharp.md b/docs/ldapSecretBackendStaticRole.csharp.md index 1c11b1ff..e7de2946 100644 --- a/docs/ldapSecretBackendStaticRole.csharp.md +++ b/docs/ldapSecretBackendStaticRole.csharp.md @@ -4,7 +4,7 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers @@ -77,6 +77,7 @@ Must be unique amongst siblings in the same scope | ResetId | *No description.* | | ResetMount | *No description.* | | ResetNamespace | *No description.* | +| ResetSkipImportRotation | *No description.* | --- @@ -392,6 +393,12 @@ private void ResetMount() private void ResetNamespace() ``` +##### `ResetSkipImportRotation` + +```csharp +private void ResetSkipImportRotation() +``` + #### Static Functions | **Name** | **Description** | @@ -495,7 +502,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -531,6 +538,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | NamespaceInput | string | *No description.* | | RoleNameInput | string | *No description.* | | RotationPeriodInput | double | *No description.* | +| SkipImportRotationInput | object | *No description.* | | UsernameInput | string | *No description.* | | Dn | string | *No description.* | | Id | string | *No description.* | @@ -538,6 +546,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Namespace | string | *No description.* | | RoleName | string | *No description.* | | RotationPeriod | double | *No description.* | +| SkipImportRotation | object | *No description.* | | Username | string | *No description.* | --- @@ -744,6 +753,16 @@ public double RotationPeriodInput { get; } --- +##### `SkipImportRotationInput`Optional + +```csharp +public object SkipImportRotationInput { get; } +``` + +- *Type:* object + +--- + ##### `UsernameInput`Optional ```csharp @@ -814,6 +833,16 @@ public double RotationPeriod { get; } --- +##### `SkipImportRotation`Required + +```csharp +public object SkipImportRotation { get; } +``` + +- *Type:* object + +--- + ##### `Username`Required ```csharp @@ -865,7 +894,8 @@ new LdapSecretBackendStaticRoleConfig { string Dn = null, string Id = null, string Mount = null, - string Namespace = null + string Namespace = null, + object SkipImportRotation = null }; ``` @@ -884,9 +914,10 @@ new LdapSecretBackendStaticRoleConfig { | RotationPeriod | double | How often Vault should rotate the password of the user entry. | | Username | string | The username of the existing LDAP entry to manage password rotation for. | | Dn | string | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | Mount | string | The path where the LDAP secrets backend is mounted. | | Namespace | string | Target namespace. (requires Enterprise). | +| SkipImportRotation | object | Skip rotation of the password on import. | --- @@ -970,7 +1001,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -984,7 +1015,7 @@ public double RotationPeriod { get; set; } How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -998,7 +1029,7 @@ public string Username { get; set; } The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -1012,7 +1043,7 @@ public string Dn { get; set; } Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1024,7 +1055,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1041,7 +1072,7 @@ public string Mount { get; set; } The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1055,7 +1086,21 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} + +--- + +##### `SkipImportRotation`Optional + +```csharp +public object SkipImportRotation { get; set; } +``` + +- *Type:* object + +Skip rotation of the password on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/ldapSecretBackendStaticRole.go.md b/docs/ldapSecretBackendStaticRole.go.md index 0e22e00f..91c166b3 100644 --- a/docs/ldapSecretBackendStaticRole.go.md +++ b/docs/ldapSecretBackendStaticRole.go.md @@ -4,12 +4,12 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.NewLdapSecretBackendStaticRole(scope Construct, id *string, config LdapSecretBackendStaticRoleConfig) LdapSecretBackendStaticRole ``` @@ -77,6 +77,7 @@ Must be unique amongst siblings in the same scope | ResetId | *No description.* | | ResetMount | *No description.* | | ResetNamespace | *No description.* | +| ResetSkipImportRotation | *No description.* | --- @@ -392,6 +393,12 @@ func ResetMount() func ResetNamespace() ``` +##### `ResetSkipImportRotation` + +```go +func ResetSkipImportRotation() +``` + #### Static Functions | **Name** | **Description** | @@ -406,7 +413,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsConstruct(x interface{}) *bool ``` @@ -438,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +459,7 @@ ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +473,7 @@ ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendstaticrole" ldapsecretbackendstaticrole.LdapSecretBackendStaticRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +502,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -531,6 +538,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | NamespaceInput | *string | *No description.* | | RoleNameInput | *string | *No description.* | | RotationPeriodInput | *f64 | *No description.* | +| SkipImportRotationInput | interface{} | *No description.* | | UsernameInput | *string | *No description.* | | Dn | *string | *No description.* | | Id | *string | *No description.* | @@ -538,6 +546,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Namespace | *string | *No description.* | | RoleName | *string | *No description.* | | RotationPeriod | *f64 | *No description.* | +| SkipImportRotation | interface{} | *No description.* | | Username | *string | *No description.* | --- @@ -744,6 +753,16 @@ func RotationPeriodInput() *f64 --- +##### `SkipImportRotationInput`Optional + +```go +func SkipImportRotationInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `UsernameInput`Optional ```go @@ -814,6 +833,16 @@ func RotationPeriod() *f64 --- +##### `SkipImportRotation`Required + +```go +func SkipImportRotation() interface{} +``` + +- *Type:* interface{} + +--- + ##### `Username`Required ```go @@ -849,7 +878,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstaticrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendstaticrole" &ldapsecretbackendstaticrole.LdapSecretBackendStaticRoleConfig { Connection: interface{}, @@ -866,6 +895,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstat Id: *string, Mount: *string, Namespace: *string, + SkipImportRotation: interface{}, } ``` @@ -884,9 +914,10 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/ldapsecretbackendstat | RotationPeriod | *f64 | How often Vault should rotate the password of the user entry. | | Username | *string | The username of the existing LDAP entry to manage password rotation for. | | Dn | *string | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | Mount | *string | The path where the LDAP secrets backend is mounted. | | Namespace | *string | Target namespace. (requires Enterprise). | +| SkipImportRotation | interface{} | Skip rotation of the password on import. | --- @@ -970,7 +1001,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -984,7 +1015,7 @@ RotationPeriod *f64 How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -998,7 +1029,7 @@ Username *string The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -1012,7 +1043,7 @@ Dn *string Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1024,7 +1055,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1041,7 +1072,7 @@ Mount *string The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1055,7 +1086,21 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} + +--- + +##### `SkipImportRotation`Optional + +```go +SkipImportRotation interface{} +``` + +- *Type:* interface{} + +Skip rotation of the password on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/ldapSecretBackendStaticRole.java.md b/docs/ldapSecretBackendStaticRole.java.md index 4fcae851..e2777c5c 100644 --- a/docs/ldapSecretBackendStaticRole.java.md +++ b/docs/ldapSecretBackendStaticRole.java.md @@ -4,7 +4,7 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers @@ -30,6 +30,8 @@ LdapSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String id) // .id(java.lang.String) // .mount(java.lang.String) // .namespace(java.lang.String) +// .skipImportRotation(java.lang.Boolean) +// .skipImportRotation(IResolvable) .build(); ``` @@ -48,9 +50,10 @@ LdapSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String id) | rotationPeriod | java.lang.Number | How often Vault should rotate the password of the user entry. | | username | java.lang.String | The username of the existing LDAP entry to manage password rotation for. | | dn | java.lang.String | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | +| skipImportRotation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip rotation of the password on import. | --- @@ -120,7 +123,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -130,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -140,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -150,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -158,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +174,7 @@ If you experience problems setting this value it might not be settable. Please t The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -181,7 +184,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} + +--- + +##### `skipImportRotation`Optional + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Skip rotation of the password on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- @@ -216,6 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetId | *No description.* | | resetMount | *No description.* | | resetNamespace | *No description.* | +| resetSkipImportRotation | *No description.* | --- @@ -533,6 +547,12 @@ public void resetMount() public void resetNamespace() ``` +##### `resetSkipImportRotation` + +```java +public void resetSkipImportRotation() +``` + #### Static Functions | **Name** | **Description** | @@ -636,7 +656,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -672,6 +692,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | namespaceInput | java.lang.String | *No description.* | | roleNameInput | java.lang.String | *No description.* | | rotationPeriodInput | java.lang.Number | *No description.* | +| skipImportRotationInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | usernameInput | java.lang.String | *No description.* | | dn | java.lang.String | *No description.* | | id | java.lang.String | *No description.* | @@ -679,6 +700,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | namespace | java.lang.String | *No description.* | | roleName | java.lang.String | *No description.* | | rotationPeriod | java.lang.Number | *No description.* | +| skipImportRotation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | username | java.lang.String | *No description.* | --- @@ -885,6 +907,16 @@ public java.lang.Number getRotationPeriodInput(); --- +##### `skipImportRotationInput`Optional + +```java +public java.lang.Object getSkipImportRotationInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `usernameInput`Optional ```java @@ -955,6 +987,16 @@ public java.lang.Number getRotationPeriod(); --- +##### `skipImportRotation`Required + +```java +public java.lang.Object getSkipImportRotation(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `username`Required ```java @@ -1011,6 +1053,8 @@ LdapSecretBackendStaticRoleConfig.builder() // .id(java.lang.String) // .mount(java.lang.String) // .namespace(java.lang.String) +// .skipImportRotation(java.lang.Boolean) +// .skipImportRotation(IResolvable) .build(); ``` @@ -1029,9 +1073,10 @@ LdapSecretBackendStaticRoleConfig.builder() | rotationPeriod | java.lang.Number | How often Vault should rotate the password of the user entry. | | username | java.lang.String | The username of the existing LDAP entry to manage password rotation for. | | dn | java.lang.String | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | +| skipImportRotation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip rotation of the password on import. | --- @@ -1115,7 +1160,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -1129,7 +1174,7 @@ public java.lang.Number getRotationPeriod(); How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -1143,7 +1188,7 @@ public java.lang.String getUsername(); The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -1157,7 +1202,7 @@ public java.lang.String getDn(); Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1169,7 +1214,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1186,7 +1231,7 @@ public java.lang.String getMount(); The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1200,7 +1245,21 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} + +--- + +##### `skipImportRotation`Optional + +```java +public java.lang.Object getSkipImportRotation(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Skip rotation of the password on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/ldapSecretBackendStaticRole.python.md b/docs/ldapSecretBackendStaticRole.python.md index fdc22cf4..ef6d92e0 100644 --- a/docs/ldapSecretBackendStaticRole.python.md +++ b/docs/ldapSecretBackendStaticRole.python.md @@ -4,7 +4,7 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers @@ -27,7 +27,8 @@ ldapSecretBackendStaticRole.LdapSecretBackendStaticRole( dn: str = None, id: str = None, mount: str = None, - namespace: str = None + namespace: str = None, + skip_import_rotation: typing.Union[bool, IResolvable] = None ) ``` @@ -46,9 +47,10 @@ ldapSecretBackendStaticRole.LdapSecretBackendStaticRole( | rotation_period | typing.Union[int, float] | How often Vault should rotate the password of the user entry. | | username | str | The username of the existing LDAP entry to manage password rotation for. | | dn | str | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | +| skip_import_rotation | typing.Union[bool, cdktf.IResolvable] | Skip rotation of the password on import. | --- @@ -118,7 +120,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -128,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -138,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -148,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -156,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -179,7 +181,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} + +--- + +##### `skip_import_rotation`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Skip rotation of the password on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- @@ -214,6 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_id | *No description.* | | reset_mount | *No description.* | | reset_namespace | *No description.* | +| reset_skip_import_rotation | *No description.* | --- @@ -566,6 +579,12 @@ def reset_mount() -> None def reset_namespace() -> None ``` +##### `reset_skip_import_rotation` + +```python +def reset_skip_import_rotation() -> None +``` + #### Static Functions | **Name** | **Description** | @@ -680,7 +699,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -716,6 +735,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | namespace_input | str | *No description.* | | role_name_input | str | *No description.* | | rotation_period_input | typing.Union[int, float] | *No description.* | +| skip_import_rotation_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | username_input | str | *No description.* | | dn | str | *No description.* | | id | str | *No description.* | @@ -723,6 +743,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | namespace | str | *No description.* | | role_name | str | *No description.* | | rotation_period | typing.Union[int, float] | *No description.* | +| skip_import_rotation | typing.Union[bool, cdktf.IResolvable] | *No description.* | | username | str | *No description.* | --- @@ -929,6 +950,16 @@ rotation_period_input: typing.Union[int, float] --- +##### `skip_import_rotation_input`Optional + +```python +skip_import_rotation_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `username_input`Optional ```python @@ -999,6 +1030,16 @@ rotation_period: typing.Union[int, float] --- +##### `skip_import_rotation`Required + +```python +skip_import_rotation: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `username`Required ```python @@ -1050,7 +1091,8 @@ ldapSecretBackendStaticRole.LdapSecretBackendStaticRoleConfig( dn: str = None, id: str = None, mount: str = None, - namespace: str = None + namespace: str = None, + skip_import_rotation: typing.Union[bool, IResolvable] = None ) ``` @@ -1069,9 +1111,10 @@ ldapSecretBackendStaticRole.LdapSecretBackendStaticRoleConfig( | rotation_period | typing.Union[int, float] | How often Vault should rotate the password of the user entry. | | username | str | The username of the existing LDAP entry to manage password rotation for. | | dn | str | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | +| skip_import_rotation | typing.Union[bool, cdktf.IResolvable] | Skip rotation of the password on import. | --- @@ -1155,7 +1198,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -1169,7 +1212,7 @@ rotation_period: typing.Union[int, float] How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -1183,7 +1226,7 @@ username: str The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -1197,7 +1240,7 @@ dn: str Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1209,7 +1252,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1226,7 +1269,7 @@ mount: str The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1240,7 +1283,21 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} + +--- + +##### `skip_import_rotation`Optional + +```python +skip_import_rotation: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Skip rotation of the password on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/ldapSecretBackendStaticRole.typescript.md b/docs/ldapSecretBackendStaticRole.typescript.md index f14c9b37..c46acfbb 100644 --- a/docs/ldapSecretBackendStaticRole.typescript.md +++ b/docs/ldapSecretBackendStaticRole.typescript.md @@ -4,7 +4,7 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers @@ -77,6 +77,7 @@ Must be unique amongst siblings in the same scope | resetId | *No description.* | | resetMount | *No description.* | | resetNamespace | *No description.* | +| resetSkipImportRotation | *No description.* | --- @@ -392,6 +393,12 @@ public resetMount(): void public resetNamespace(): void ``` +##### `resetSkipImportRotation` + +```typescript +public resetSkipImportRotation(): void +``` + #### Static Functions | **Name** | **Description** | @@ -495,7 +502,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -531,6 +538,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | namespaceInput | string | *No description.* | | roleNameInput | string | *No description.* | | rotationPeriodInput | number | *No description.* | +| skipImportRotationInput | boolean \| cdktf.IResolvable | *No description.* | | usernameInput | string | *No description.* | | dn | string | *No description.* | | id | string | *No description.* | @@ -538,6 +546,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | namespace | string | *No description.* | | roleName | string | *No description.* | | rotationPeriod | number | *No description.* | +| skipImportRotation | boolean \| cdktf.IResolvable | *No description.* | | username | string | *No description.* | --- @@ -744,6 +753,16 @@ public readonly rotationPeriodInput: number; --- +##### `skipImportRotationInput`Optional + +```typescript +public readonly skipImportRotationInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `usernameInput`Optional ```typescript @@ -814,6 +833,16 @@ public readonly rotationPeriod: number; --- +##### `skipImportRotation`Required + +```typescript +public readonly skipImportRotation: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `username`Required ```typescript @@ -869,9 +898,10 @@ const ldapSecretBackendStaticRoleConfig: ldapSecretBackendStaticRole.LdapSecretB | rotationPeriod | number | How often Vault should rotate the password of the user entry. | | username | string | The username of the existing LDAP entry to manage password rotation for. | | dn | string | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | string | The path where the LDAP secrets backend is mounted. | | namespace | string | Target namespace. (requires Enterprise). | +| skipImportRotation | boolean \| cdktf.IResolvable | Skip rotation of the password on import. | --- @@ -955,7 +985,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -969,7 +999,7 @@ public readonly rotationPeriod: number; How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -983,7 +1013,7 @@ public readonly username: string; The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -997,7 +1027,7 @@ public readonly dn: string; Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1009,7 +1039,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1026,7 +1056,7 @@ public readonly mount: string; The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1040,7 +1070,21 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} + +--- + +##### `skipImportRotation`Optional + +```typescript +public readonly skipImportRotation: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Skip rotation of the password on import. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/managedKeys.csharp.md b/docs/managedKeys.csharp.md index 904dcaf3..d31bdd3f 100644 --- a/docs/managedKeys.csharp.md +++ b/docs/managedKeys.csharp.md @@ -4,7 +4,7 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers @@ -541,7 +541,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -900,7 +900,7 @@ public string AccessKey { get; set; } The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -914,7 +914,7 @@ public string KeyBits { get; set; } The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -928,7 +928,7 @@ public string KeyType { get; set; } The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -942,7 +942,7 @@ public string KmsKey { get; set; } An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -956,7 +956,7 @@ public string Name { get; set; } A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -970,7 +970,7 @@ public string SecretKey { get; set; } The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -984,7 +984,7 @@ public object AllowGenerateKey { get; set; } If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -998,7 +998,7 @@ public object AllowReplaceKey { get; set; } Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1012,7 +1012,7 @@ public object AllowStoreKey { get; set; } Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1026,7 +1026,7 @@ public object AnyMount { get; set; } Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1040,7 +1040,7 @@ public string Curve { get; set; } The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1054,7 +1054,7 @@ public string Endpoint { get; set; } Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1068,7 +1068,7 @@ public string Region { get; set; } The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1128,7 +1128,7 @@ public string ClientId { get; set; } The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1142,7 +1142,7 @@ public string ClientSecret { get; set; } The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1156,7 +1156,7 @@ public string KeyName { get; set; } The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1170,7 +1170,7 @@ public string KeyType { get; set; } The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1184,7 +1184,7 @@ public string Name { get; set; } A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1198,7 +1198,7 @@ public string TenantId { get; set; } The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1212,7 +1212,7 @@ public string VaultName { get; set; } The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1226,7 +1226,7 @@ public object AllowGenerateKey { get; set; } If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1240,7 +1240,7 @@ public object AllowReplaceKey { get; set; } Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1254,7 +1254,7 @@ public object AllowStoreKey { get; set; } Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1268,7 +1268,7 @@ public object AnyMount { get; set; } Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1282,7 +1282,7 @@ public string Environment { get; set; } The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1298,7 +1298,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1312,7 +1312,7 @@ public string Resource { get; set; } The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1352,7 +1352,7 @@ new ManagedKeysConfig { | Provisioners | object[] | *No description.* | | Aws | object | aws block. | | Azure | object | azure block. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Pkcs | object | pkcs block. | @@ -1438,7 +1438,7 @@ public object Aws { get; set; } aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1452,7 +1452,7 @@ public object Azure { get; set; } azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1464,7 +1464,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1481,7 +1481,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1495,7 +1495,7 @@ public object Pkcs { get; set; } pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1557,7 +1557,7 @@ public string KeyId { get; set; } The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1571,7 +1571,7 @@ public string KeyLabel { get; set; } The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1585,7 +1585,7 @@ public string Library { get; set; } The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1599,7 +1599,7 @@ public string Mechanism { get; set; } The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1613,7 +1613,7 @@ public string Name { get; set; } A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1627,7 +1627,7 @@ public string Pin { get; set; } The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1641,7 +1641,7 @@ public object AllowGenerateKey { get; set; } If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1655,7 +1655,7 @@ public object AllowReplaceKey { get; set; } Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1669,7 +1669,7 @@ public object AllowStoreKey { get; set; } Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1683,7 +1683,7 @@ public object AnyMount { get; set; } Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1697,7 +1697,7 @@ public string Curve { get; set; } Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1711,7 +1711,7 @@ public string ForceRwSession { get; set; } Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1727,7 +1727,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1741,7 +1741,7 @@ public string Slot { get; set; } The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1755,7 +1755,7 @@ public string TokenLabel { get; set; } The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- diff --git a/docs/managedKeys.go.md b/docs/managedKeys.go.md index 4baf8e82..79e2b9bb 100644 --- a/docs/managedKeys.go.md +++ b/docs/managedKeys.go.md @@ -4,12 +4,12 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.NewManagedKeys(scope Construct, id *string, config ManagedKeysConfig) ManagedKeys ``` @@ -452,7 +452,7 @@ func ResetPkcs() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.ManagedKeys_IsConstruct(x interface{}) *bool ``` @@ -484,7 +484,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.ManagedKeys_IsTerraformElement(x interface{}) *bool ``` @@ -498,7 +498,7 @@ managedkeys.ManagedKeys_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.ManagedKeys_IsTerraformResource(x interface{}) *bool ``` @@ -512,7 +512,7 @@ managedkeys.ManagedKeys_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.ManagedKeys_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -541,7 +541,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -851,7 +851,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" &managedkeys.ManagedKeysAws { AccessKey: *string, @@ -900,7 +900,7 @@ AccessKey *string The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -914,7 +914,7 @@ KeyBits *string The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -928,7 +928,7 @@ KeyType *string The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -942,7 +942,7 @@ KmsKey *string An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -956,7 +956,7 @@ Name *string A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -970,7 +970,7 @@ SecretKey *string The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -984,7 +984,7 @@ AllowGenerateKey interface{} If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -998,7 +998,7 @@ AllowReplaceKey interface{} Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1012,7 +1012,7 @@ AllowStoreKey interface{} Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1026,7 +1026,7 @@ AnyMount interface{} Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1040,7 +1040,7 @@ Curve *string The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1054,7 +1054,7 @@ Endpoint *string Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1068,7 +1068,7 @@ Region *string The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1077,7 +1077,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" &managedkeys.ManagedKeysAzure { ClientId: *string, @@ -1128,7 +1128,7 @@ ClientId *string The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1142,7 +1142,7 @@ ClientSecret *string The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1156,7 +1156,7 @@ KeyName *string The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1170,7 +1170,7 @@ KeyType *string The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1184,7 +1184,7 @@ Name *string A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1198,7 +1198,7 @@ TenantId *string The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1212,7 +1212,7 @@ VaultName *string The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1226,7 +1226,7 @@ AllowGenerateKey interface{} If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1240,7 +1240,7 @@ AllowReplaceKey interface{} Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1254,7 +1254,7 @@ AllowStoreKey interface{} Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1268,7 +1268,7 @@ AnyMount interface{} Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1282,7 +1282,7 @@ Environment *string The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1298,7 +1298,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1312,7 +1312,7 @@ Resource *string The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1321,7 +1321,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" &managedkeys.ManagedKeysConfig { Connection: interface{}, @@ -1352,7 +1352,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" | Provisioners | *[]interface{} | *No description.* | | Aws | interface{} | aws block. | | Azure | interface{} | azure block. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Pkcs | interface{} | pkcs block. | @@ -1438,7 +1438,7 @@ Aws interface{} aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1452,7 +1452,7 @@ Azure interface{} azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1464,7 +1464,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1481,7 +1481,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1495,7 +1495,7 @@ Pkcs interface{} pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1504,7 +1504,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" &managedkeys.ManagedKeysPkcs { KeyId: *string, @@ -1557,7 +1557,7 @@ KeyId *string The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1571,7 +1571,7 @@ KeyLabel *string The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1585,7 +1585,7 @@ Library *string The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1599,7 +1599,7 @@ Mechanism *string The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1613,7 +1613,7 @@ Name *string A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1627,7 +1627,7 @@ Pin *string The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1641,7 +1641,7 @@ AllowGenerateKey interface{} If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1655,7 +1655,7 @@ AllowReplaceKey interface{} Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1669,7 +1669,7 @@ AllowStoreKey interface{} Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1683,7 +1683,7 @@ AnyMount interface{} Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1697,7 +1697,7 @@ Curve *string Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1711,7 +1711,7 @@ ForceRwSession *string Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1727,7 +1727,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1741,7 +1741,7 @@ Slot *string The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1755,7 +1755,7 @@ TokenLabel *string The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- @@ -1766,7 +1766,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.NewManagedKeysAwsList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) ManagedKeysAwsList ``` @@ -1926,7 +1926,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.NewManagedKeysAwsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) ManagedKeysAwsOutputReference ``` @@ -2539,7 +2539,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.NewManagedKeysAzureList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) ManagedKeysAzureList ``` @@ -2699,7 +2699,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.NewManagedKeysAzureOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) ManagedKeysAzureOutputReference ``` @@ -3334,7 +3334,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.NewManagedKeysPkcsList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) ManagedKeysPkcsList ``` @@ -3494,7 +3494,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/managedkeys" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" managedkeys.NewManagedKeysPkcsOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) ManagedKeysPkcsOutputReference ``` diff --git a/docs/managedKeys.java.md b/docs/managedKeys.java.md index 902240c9..e697fb80 100644 --- a/docs/managedKeys.java.md +++ b/docs/managedKeys.java.md @@ -4,7 +4,7 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers @@ -47,7 +47,7 @@ ManagedKeys.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | aws | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysAws> | aws block. | | azure | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysAzure> | azure block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pkcs | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysPkcs> | pkcs block. | @@ -119,7 +119,7 @@ Must be unique amongst siblings in the same scope aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -129,7 +129,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -150,7 +150,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -1024,7 +1024,7 @@ public java.lang.String getAccessKey(); The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -1038,7 +1038,7 @@ public java.lang.String getKeyBits(); The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1052,7 +1052,7 @@ public java.lang.String getKeyType(); The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1066,7 +1066,7 @@ public java.lang.String getKmsKey(); An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -1080,7 +1080,7 @@ public java.lang.String getName(); A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1094,7 +1094,7 @@ public java.lang.String getSecretKey(); The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -1108,7 +1108,7 @@ public java.lang.Object getAllowGenerateKey(); If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1122,7 +1122,7 @@ public java.lang.Object getAllowReplaceKey(); Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1136,7 +1136,7 @@ public java.lang.Object getAllowStoreKey(); Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1150,7 +1150,7 @@ public java.lang.Object getAnyMount(); Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1164,7 +1164,7 @@ public java.lang.String getCurve(); The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1178,7 +1178,7 @@ public java.lang.String getEndpoint(); Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1192,7 +1192,7 @@ public java.lang.String getRegion(); The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1256,7 +1256,7 @@ public java.lang.String getClientId(); The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1270,7 +1270,7 @@ public java.lang.String getClientSecret(); The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1284,7 +1284,7 @@ public java.lang.String getKeyName(); The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1298,7 +1298,7 @@ public java.lang.String getKeyType(); The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1312,7 +1312,7 @@ public java.lang.String getName(); A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1326,7 +1326,7 @@ public java.lang.String getTenantId(); The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1340,7 +1340,7 @@ public java.lang.String getVaultName(); The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1354,7 +1354,7 @@ public java.lang.Object getAllowGenerateKey(); If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1368,7 +1368,7 @@ public java.lang.Object getAllowReplaceKey(); Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1382,7 +1382,7 @@ public java.lang.Object getAllowStoreKey(); Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1396,7 +1396,7 @@ public java.lang.Object getAnyMount(); Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1410,7 +1410,7 @@ public java.lang.String getEnvironment(); The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1426,7 +1426,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1440,7 +1440,7 @@ public java.lang.String getResource(); The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1487,7 +1487,7 @@ ManagedKeysConfig.builder() | provisioners | java.util.List | *No description.* | | aws | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysAws> | aws block. | | azure | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysAzure> | azure block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pkcs | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysPkcs> | pkcs block. | @@ -1573,7 +1573,7 @@ public java.lang.Object getAws(); aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1587,7 +1587,7 @@ public java.lang.Object getAzure(); azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1599,7 +1599,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1616,7 +1616,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1630,7 +1630,7 @@ public java.lang.Object getPkcs(); pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1696,7 +1696,7 @@ public java.lang.String getKeyId(); The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1710,7 +1710,7 @@ public java.lang.String getKeyLabel(); The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1724,7 +1724,7 @@ public java.lang.String getLibrary(); The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1738,7 +1738,7 @@ public java.lang.String getMechanism(); The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1752,7 +1752,7 @@ public java.lang.String getName(); A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1766,7 +1766,7 @@ public java.lang.String getPin(); The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1780,7 +1780,7 @@ public java.lang.Object getAllowGenerateKey(); If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1794,7 +1794,7 @@ public java.lang.Object getAllowReplaceKey(); Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1808,7 +1808,7 @@ public java.lang.Object getAllowStoreKey(); Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1822,7 +1822,7 @@ public java.lang.Object getAnyMount(); Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1836,7 +1836,7 @@ public java.lang.String getCurve(); Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1850,7 +1850,7 @@ public java.lang.String getForceRwSession(); Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1866,7 +1866,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1880,7 +1880,7 @@ public java.lang.String getSlot(); The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1894,7 +1894,7 @@ public java.lang.String getTokenLabel(); The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- diff --git a/docs/managedKeys.python.md b/docs/managedKeys.python.md index 48b47c37..e8049d7c 100644 --- a/docs/managedKeys.python.md +++ b/docs/managedKeys.python.md @@ -4,7 +4,7 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers @@ -42,7 +42,7 @@ managedKeys.ManagedKeys( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | aws | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysAws]] | aws block. | | azure | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysAzure]] | azure block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | | pkcs | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysPkcs]] | pkcs block. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -708,7 +708,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -1067,7 +1067,7 @@ access_key: str The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -1081,7 +1081,7 @@ key_bits: str The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1095,7 +1095,7 @@ key_type: str The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1109,7 +1109,7 @@ kms_key: str An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -1123,7 +1123,7 @@ name: str A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1137,7 +1137,7 @@ secret_key: str The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -1151,7 +1151,7 @@ allow_generate_key: typing.Union[bool, IResolvable] If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1165,7 +1165,7 @@ allow_replace_key: typing.Union[bool, IResolvable] Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1179,7 +1179,7 @@ allow_store_key: typing.Union[bool, IResolvable] Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1193,7 +1193,7 @@ any_mount: typing.Union[bool, IResolvable] Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1207,7 +1207,7 @@ curve: str The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1221,7 +1221,7 @@ endpoint: str Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1235,7 +1235,7 @@ region: str The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1295,7 +1295,7 @@ client_id: str The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1309,7 +1309,7 @@ client_secret: str The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1323,7 +1323,7 @@ key_name: str The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1337,7 +1337,7 @@ key_type: str The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1351,7 +1351,7 @@ name: str A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1365,7 +1365,7 @@ tenant_id: str The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1379,7 +1379,7 @@ vault_name: str The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1393,7 +1393,7 @@ allow_generate_key: typing.Union[bool, IResolvable] If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1407,7 +1407,7 @@ allow_replace_key: typing.Union[bool, IResolvable] Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1421,7 +1421,7 @@ allow_store_key: typing.Union[bool, IResolvable] Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1435,7 +1435,7 @@ any_mount: typing.Union[bool, IResolvable] Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1449,7 +1449,7 @@ environment: str The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1465,7 +1465,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1479,7 +1479,7 @@ resource: str The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1519,7 +1519,7 @@ managedKeys.ManagedKeysConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | aws | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysAws]] | aws block. | | azure | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysAzure]] | azure block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | | pkcs | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysPkcs]] | pkcs block. | @@ -1605,7 +1605,7 @@ aws: typing.Union[IResolvable, typing.List[ManagedKeysAws]] aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1619,7 +1619,7 @@ azure: typing.Union[IResolvable, typing.List[ManagedKeysAzure]] azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1631,7 +1631,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1648,7 +1648,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1662,7 +1662,7 @@ pkcs: typing.Union[IResolvable, typing.List[ManagedKeysPkcs]] pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1724,7 +1724,7 @@ key_id: str The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1738,7 +1738,7 @@ key_label: str The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1752,7 +1752,7 @@ library: str The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1766,7 +1766,7 @@ mechanism: str The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1780,7 +1780,7 @@ name: str A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1794,7 +1794,7 @@ pin: str The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1808,7 +1808,7 @@ allow_generate_key: typing.Union[bool, IResolvable] If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1822,7 +1822,7 @@ allow_replace_key: typing.Union[bool, IResolvable] Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1836,7 +1836,7 @@ allow_store_key: typing.Union[bool, IResolvable] Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1850,7 +1850,7 @@ any_mount: typing.Union[bool, IResolvable] Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1864,7 +1864,7 @@ curve: str Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1878,7 +1878,7 @@ force_rw_session: str Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1894,7 +1894,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1908,7 +1908,7 @@ slot: str The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1922,7 +1922,7 @@ token_label: str The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- diff --git a/docs/managedKeys.typescript.md b/docs/managedKeys.typescript.md index 129e4cc0..fea4d502 100644 --- a/docs/managedKeys.typescript.md +++ b/docs/managedKeys.typescript.md @@ -4,7 +4,7 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers @@ -541,7 +541,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -886,7 +886,7 @@ public readonly accessKey: string; The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -900,7 +900,7 @@ public readonly keyBits: string; The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -914,7 +914,7 @@ public readonly keyType: string; The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -928,7 +928,7 @@ public readonly kmsKey: string; An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -942,7 +942,7 @@ public readonly name: string; A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -956,7 +956,7 @@ public readonly secretKey: string; The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -970,7 +970,7 @@ public readonly allowGenerateKey: boolean | IResolvable; If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -984,7 +984,7 @@ public readonly allowReplaceKey: boolean | IResolvable; Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -998,7 +998,7 @@ public readonly allowStoreKey: boolean | IResolvable; Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1012,7 +1012,7 @@ public readonly anyMount: boolean | IResolvable; Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1026,7 +1026,7 @@ public readonly curve: string; The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1040,7 +1040,7 @@ public readonly endpoint: string; Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1054,7 +1054,7 @@ public readonly region: string; The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1099,7 +1099,7 @@ public readonly clientId: string; The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1113,7 +1113,7 @@ public readonly clientSecret: string; The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1127,7 +1127,7 @@ public readonly keyName: string; The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1141,7 +1141,7 @@ public readonly keyType: string; The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1155,7 +1155,7 @@ public readonly name: string; A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1169,7 +1169,7 @@ public readonly tenantId: string; The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1183,7 +1183,7 @@ public readonly vaultName: string; The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1197,7 +1197,7 @@ public readonly allowGenerateKey: boolean | IResolvable; If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1211,7 +1211,7 @@ public readonly allowReplaceKey: boolean | IResolvable; Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1225,7 +1225,7 @@ public readonly allowStoreKey: boolean | IResolvable; Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1239,7 +1239,7 @@ public readonly anyMount: boolean | IResolvable; Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1253,7 +1253,7 @@ public readonly environment: string; The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1269,7 +1269,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1283,7 +1283,7 @@ public readonly resource: string; The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1310,7 +1310,7 @@ const managedKeysConfig: managedKeys.ManagedKeysConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | aws | cdktf.IResolvable \| ManagedKeysAws[] | aws block. | | azure | cdktf.IResolvable \| ManagedKeysAzure[] | azure block. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | string | Target namespace. (requires Enterprise). | | pkcs | cdktf.IResolvable \| ManagedKeysPkcs[] | pkcs block. | @@ -1396,7 +1396,7 @@ public readonly aws: IResolvable | ManagedKeysAws[]; aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1410,7 +1410,7 @@ public readonly azure: IResolvable | ManagedKeysAzure[]; azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1422,7 +1422,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1439,7 +1439,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1453,7 +1453,7 @@ public readonly pkcs: IResolvable | ManagedKeysPkcs[]; pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1499,7 +1499,7 @@ public readonly keyId: string; The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1513,7 +1513,7 @@ public readonly keyLabel: string; The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1527,7 +1527,7 @@ public readonly library: string; The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1541,7 +1541,7 @@ public readonly mechanism: string; The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1555,7 +1555,7 @@ public readonly name: string; A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1569,7 +1569,7 @@ public readonly pin: string; The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1583,7 +1583,7 @@ public readonly allowGenerateKey: boolean | IResolvable; If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1597,7 +1597,7 @@ public readonly allowReplaceKey: boolean | IResolvable; Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1611,7 +1611,7 @@ public readonly allowStoreKey: boolean | IResolvable; Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1625,7 +1625,7 @@ public readonly anyMount: boolean | IResolvable; Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1639,7 +1639,7 @@ public readonly curve: string; Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1653,7 +1653,7 @@ public readonly forceRwSession: string; Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1669,7 +1669,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1683,7 +1683,7 @@ public readonly slot: string; The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1697,7 +1697,7 @@ public readonly tokenLabel: string; The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- diff --git a/docs/mfaDuo.csharp.md b/docs/mfaDuo.csharp.md index 617c5d4e..9470c01f 100644 --- a/docs/mfaDuo.csharp.md +++ b/docs/mfaDuo.csharp.md @@ -4,7 +4,7 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -931,7 +931,7 @@ new MfaDuoConfig { | MountAccessor | string | The mount to tie this method to for use in automatic mappings. | | Name | string | Name of the MFA method. | | SecretKey | string | Secret key for Duo. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | PushInfo | string | Push information for Duo. | | UsernameFormat | string | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1018,7 +1018,7 @@ public string ApiHostname { get; set; } API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1032,7 +1032,7 @@ public string IntegrationKey { get; set; } Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1048,7 +1048,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1062,7 +1062,7 @@ public string Name { get; set; } Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1076,7 +1076,7 @@ public string SecretKey { get; set; } Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1088,7 +1088,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1105,7 +1105,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1119,7 +1119,7 @@ public string PushInfo { get; set; } Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1133,7 +1133,7 @@ public string UsernameFormat { get; set; } A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaDuo.go.md b/docs/mfaDuo.go.md index c0384f69..5b54bf74 100644 --- a/docs/mfaDuo.go.md +++ b/docs/mfaDuo.go.md @@ -4,12 +4,12 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaduo" mfaduo.NewMfaDuo(scope Construct, id *string, config MfaDuoConfig) MfaDuo ``` @@ -406,7 +406,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaduo" mfaduo.MfaDuo_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaduo" mfaduo.MfaDuo_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ mfaduo.MfaDuo_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaduo" mfaduo.MfaDuo_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ mfaduo.MfaDuo_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaduo" mfaduo.MfaDuo_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -893,7 +893,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaduo" &mfaduo.MfaDuoConfig { Connection: interface{}, @@ -931,7 +931,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaduo" | MountAccessor | *string | The mount to tie this method to for use in automatic mappings. | | Name | *string | Name of the MFA method. | | SecretKey | *string | Secret key for Duo. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | PushInfo | *string | Push information for Duo. | | UsernameFormat | *string | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1018,7 +1018,7 @@ ApiHostname *string API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1032,7 +1032,7 @@ IntegrationKey *string Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1048,7 +1048,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1062,7 +1062,7 @@ Name *string Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1076,7 +1076,7 @@ SecretKey *string Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1088,7 +1088,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1105,7 +1105,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1119,7 +1119,7 @@ PushInfo *string Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1133,7 +1133,7 @@ UsernameFormat *string A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaDuo.java.md b/docs/mfaDuo.java.md index 286fe2e9..9528898b 100644 --- a/docs/mfaDuo.java.md +++ b/docs/mfaDuo.java.md @@ -4,7 +4,7 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers @@ -51,7 +51,7 @@ MfaDuo.Builder.create(Construct scope, java.lang.String id) | mountAccessor | java.lang.String | The mount to tie this method to for use in automatic mappings. | | name | java.lang.String | Name of the MFA method. | | secretKey | java.lang.String | Secret key for Duo. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pushInfo | java.lang.String | Push information for Duo. | | usernameFormat | java.lang.String | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -146,7 +146,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- @@ -662,7 +662,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -1102,7 +1102,7 @@ MfaDuoConfig.builder() | mountAccessor | java.lang.String | The mount to tie this method to for use in automatic mappings. | | name | java.lang.String | Name of the MFA method. | | secretKey | java.lang.String | Secret key for Duo. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pushInfo | java.lang.String | Push information for Duo. | | usernameFormat | java.lang.String | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1189,7 +1189,7 @@ public java.lang.String getApiHostname(); API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1203,7 +1203,7 @@ public java.lang.String getIntegrationKey(); Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1219,7 +1219,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1233,7 +1233,7 @@ public java.lang.String getName(); Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1247,7 +1247,7 @@ public java.lang.String getSecretKey(); Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1259,7 +1259,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1276,7 +1276,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1290,7 +1290,7 @@ public java.lang.String getPushInfo(); Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1304,7 +1304,7 @@ public java.lang.String getUsernameFormat(); A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaDuo.python.md b/docs/mfaDuo.python.md index cf8f3323..0d1b9c78 100644 --- a/docs/mfaDuo.python.md +++ b/docs/mfaDuo.python.md @@ -4,7 +4,7 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers @@ -49,7 +49,7 @@ mfaDuo.MfaDuo( | mount_accessor | str | The mount to tie this method to for use in automatic mappings. | | name | str | Name of the MFA method. | | secret_key | str | Secret key for Duo. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | str | Target namespace. (requires Enterprise). | | push_info | str | Push information for Duo. | | username_format | str | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -144,7 +144,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -185,7 +185,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- @@ -706,7 +706,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -1142,7 +1142,7 @@ mfaDuo.MfaDuoConfig( | mount_accessor | str | The mount to tie this method to for use in automatic mappings. | | name | str | Name of the MFA method. | | secret_key | str | Secret key for Duo. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | str | Target namespace. (requires Enterprise). | | push_info | str | Push information for Duo. | | username_format | str | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1229,7 +1229,7 @@ api_hostname: str API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1243,7 +1243,7 @@ integration_key: str Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1259,7 +1259,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1273,7 +1273,7 @@ name: str Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1287,7 +1287,7 @@ secret_key: str Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1299,7 +1299,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1316,7 +1316,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1330,7 +1330,7 @@ push_info: str Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1344,7 +1344,7 @@ username_format: str A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaDuo.typescript.md b/docs/mfaDuo.typescript.md index 3ef4cc33..1c0caf0e 100644 --- a/docs/mfaDuo.typescript.md +++ b/docs/mfaDuo.typescript.md @@ -4,7 +4,7 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ const mfaDuoConfig: mfaDuo.MfaDuoConfig = { ... } | mountAccessor | string | The mount to tie this method to for use in automatic mappings. | | name | string | Name of the MFA method. | | secretKey | string | Secret key for Duo. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | string | Target namespace. (requires Enterprise). | | pushInfo | string | Push information for Duo. | | usernameFormat | string | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1001,7 +1001,7 @@ public readonly apiHostname: string; API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1015,7 +1015,7 @@ public readonly integrationKey: string; Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1031,7 +1031,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1045,7 +1045,7 @@ public readonly name: string; Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1059,7 +1059,7 @@ public readonly secretKey: string; Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1071,7 +1071,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1088,7 +1088,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1102,7 +1102,7 @@ public readonly pushInfo: string; Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1116,7 +1116,7 @@ public readonly usernameFormat: string; A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaOkta.csharp.md b/docs/mfaOkta.csharp.md index 2bf60eba..2d781035 100644 --- a/docs/mfaOkta.csharp.md +++ b/docs/mfaOkta.csharp.md @@ -4,7 +4,7 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1025,7 +1025,7 @@ public string ApiToken { get; set; } Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1041,7 +1041,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1055,7 +1055,7 @@ public string Name { get; set; } Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1069,7 +1069,7 @@ public string OrgName { get; set; } Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1083,7 +1083,7 @@ public string BaseUrl { get; set; } If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1097,7 +1097,7 @@ public string Id { get; set; } ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1114,7 +1114,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1128,7 +1128,7 @@ public object PrimaryEmail { get; set; } If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1142,7 +1142,7 @@ public string UsernameFormat { get; set; } A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaOkta.go.md b/docs/mfaOkta.go.md index f25ce41f..cfc46951 100644 --- a/docs/mfaOkta.go.md +++ b/docs/mfaOkta.go.md @@ -4,12 +4,12 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaokta" mfaokta.NewMfaOkta(scope Construct, id *string, config MfaOktaConfig) MfaOkta ``` @@ -413,7 +413,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaokta" mfaokta.MfaOkta_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaokta" mfaokta.MfaOkta_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ mfaokta.MfaOkta_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaokta" mfaokta.MfaOkta_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ mfaokta.MfaOkta_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaokta" mfaokta.MfaOkta_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -900,7 +900,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfaokta" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaokta" &mfaokta.MfaOktaConfig { Connection: interface{}, @@ -1025,7 +1025,7 @@ ApiToken *string Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1041,7 +1041,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1055,7 +1055,7 @@ Name *string Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1069,7 +1069,7 @@ OrgName *string Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1083,7 +1083,7 @@ BaseUrl *string If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1097,7 +1097,7 @@ Id *string ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1114,7 +1114,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1128,7 +1128,7 @@ PrimaryEmail interface{} If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1142,7 +1142,7 @@ UsernameFormat *string A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaOkta.java.md b/docs/mfaOkta.java.md index aa3a82f1..51e40e0b 100644 --- a/docs/mfaOkta.java.md +++ b/docs/mfaOkta.java.md @@ -4,7 +4,7 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers @@ -125,7 +125,7 @@ Must be unique amongst siblings in the same scope Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -137,7 +137,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -190,7 +190,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- @@ -672,7 +672,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1200,7 +1200,7 @@ public java.lang.String getApiToken(); Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1216,7 +1216,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1230,7 +1230,7 @@ public java.lang.String getName(); Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1244,7 +1244,7 @@ public java.lang.String getOrgName(); Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1258,7 +1258,7 @@ public java.lang.String getBaseUrl(); If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1272,7 +1272,7 @@ public java.lang.String getId(); ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1289,7 +1289,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1303,7 +1303,7 @@ public java.lang.Object getPrimaryEmail(); If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1317,7 +1317,7 @@ public java.lang.String getUsernameFormat(); A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaOkta.python.md b/docs/mfaOkta.python.md index 985d3431..91fea309 100644 --- a/docs/mfaOkta.python.md +++ b/docs/mfaOkta.python.md @@ -4,7 +4,7 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -134,7 +134,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- @@ -715,7 +715,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1238,7 +1238,7 @@ api_token: str Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1254,7 +1254,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1268,7 +1268,7 @@ name: str Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1282,7 +1282,7 @@ org_name: str Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1296,7 +1296,7 @@ base_url: str If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1310,7 +1310,7 @@ id: str ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1327,7 +1327,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1341,7 +1341,7 @@ primary_email: typing.Union[bool, IResolvable] If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1355,7 +1355,7 @@ username_format: str A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaOkta.typescript.md b/docs/mfaOkta.typescript.md index 4bc2b70f..f1cc9848 100644 --- a/docs/mfaOkta.typescript.md +++ b/docs/mfaOkta.typescript.md @@ -4,7 +4,7 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1008,7 +1008,7 @@ public readonly apiToken: string; Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1024,7 +1024,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1038,7 +1038,7 @@ public readonly name: string; Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1052,7 +1052,7 @@ public readonly orgName: string; Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1066,7 +1066,7 @@ public readonly baseUrl: string; If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1080,7 +1080,7 @@ public readonly id: string; ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1111,7 +1111,7 @@ public readonly primaryEmail: boolean | IResolvable; If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1125,7 +1125,7 @@ public readonly usernameFormat: string; A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaPingid.csharp.md b/docs/mfaPingid.csharp.md index 0e8cc62e..4ebd3525 100644 --- a/docs/mfaPingid.csharp.md +++ b/docs/mfaPingid.csharp.md @@ -4,7 +4,7 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1018,7 +1018,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1032,7 +1032,7 @@ public string Name { get; set; } Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1046,7 +1046,7 @@ public string SettingsFileBase64 { get; set; } A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1060,7 +1060,7 @@ public string Id { get; set; } ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1077,7 +1077,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1091,7 +1091,7 @@ public string UsernameFormat { get; set; } A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaPingid.go.md b/docs/mfaPingid.go.md index 30993b5b..a4d749ce 100644 --- a/docs/mfaPingid.go.md +++ b/docs/mfaPingid.go.md @@ -4,12 +4,12 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfapingid" mfapingid.NewMfaPingid(scope Construct, id *string, config MfaPingidConfig) MfaPingid ``` @@ -399,7 +399,7 @@ func ResetUsernameFormat() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfapingid" mfapingid.MfaPingid_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfapingid" mfapingid.MfaPingid_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ mfapingid.MfaPingid_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfapingid" mfapingid.MfaPingid_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ mfapingid.MfaPingid_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfapingid" mfapingid.MfaPingid_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -897,7 +897,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfapingid" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfapingid" &mfapingid.MfaPingidConfig { Connection: interface{}, @@ -1018,7 +1018,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1032,7 +1032,7 @@ Name *string Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1046,7 +1046,7 @@ SettingsFileBase64 *string A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1060,7 +1060,7 @@ Id *string ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1077,7 +1077,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1091,7 +1091,7 @@ UsernameFormat *string A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaPingid.java.md b/docs/mfaPingid.java.md index fd58c9ae..bd733826 100644 --- a/docs/mfaPingid.java.md +++ b/docs/mfaPingid.java.md @@ -4,7 +4,7 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers @@ -120,7 +120,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- @@ -621,7 +621,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1155,7 +1155,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1169,7 +1169,7 @@ public java.lang.String getName(); Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1183,7 +1183,7 @@ public java.lang.String getSettingsFileBase64(); A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1197,7 +1197,7 @@ public java.lang.String getId(); ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1214,7 +1214,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1228,7 +1228,7 @@ public java.lang.String getUsernameFormat(); A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaPingid.python.md b/docs/mfaPingid.python.md index 453e4bd5..98447816 100644 --- a/docs/mfaPingid.python.md +++ b/docs/mfaPingid.python.md @@ -4,7 +4,7 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers @@ -118,7 +118,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- @@ -665,7 +665,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1195,7 +1195,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1209,7 +1209,7 @@ name: str Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1223,7 +1223,7 @@ settings_file_base64: str A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1237,7 +1237,7 @@ id: str ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1254,7 +1254,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1268,7 +1268,7 @@ username_format: str A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaPingid.typescript.md b/docs/mfaPingid.typescript.md index 610762a6..90428247 100644 --- a/docs/mfaPingid.typescript.md +++ b/docs/mfaPingid.typescript.md @@ -4,7 +4,7 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1004,7 +1004,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1018,7 +1018,7 @@ public readonly name: string; Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1032,7 +1032,7 @@ public readonly settingsFileBase64: string; A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1046,7 +1046,7 @@ public readonly id: string; ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1063,7 +1063,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1077,7 +1077,7 @@ public readonly usernameFormat: string; A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaTotp.csharp.md b/docs/mfaTotp.csharp.md index a2dcea80..1682e11c 100644 --- a/docs/mfaTotp.csharp.md +++ b/docs/mfaTotp.csharp.md @@ -4,7 +4,7 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1070,7 +1070,7 @@ public string Issuer { get; set; } The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1084,7 +1084,7 @@ public string Name { get; set; } Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1098,7 +1098,7 @@ public string Algorithm { get; set; } Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1112,7 +1112,7 @@ public double Digits { get; set; } The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1126,7 +1126,7 @@ public string Id { get; set; } ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1143,7 +1143,7 @@ public double KeySize { get; set; } Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1157,7 +1157,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1171,7 +1171,7 @@ public double Period { get; set; } The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1185,7 +1185,7 @@ public double QrSize { get; set; } The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1201,7 +1201,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mfaTotp.go.md b/docs/mfaTotp.go.md index bfb28433..894ac7d3 100644 --- a/docs/mfaTotp.go.md +++ b/docs/mfaTotp.go.md @@ -4,12 +4,12 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfatotp" mfatotp.NewMfaTotp(scope Construct, id *string, config MfaTotpConfig) MfaTotp ``` @@ -434,7 +434,7 @@ func ResetSkew() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfatotp" mfatotp.MfaTotp_IsConstruct(x interface{}) *bool ``` @@ -466,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfatotp" mfatotp.MfaTotp_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +480,7 @@ mfatotp.MfaTotp_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfatotp" mfatotp.MfaTotp_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +494,7 @@ mfatotp.MfaTotp_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfatotp" mfatotp.MfaTotp_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -523,7 +523,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -943,7 +943,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mfatotp" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfatotp" &mfatotp.MfaTotpConfig { Connection: interface{}, @@ -1070,7 +1070,7 @@ Issuer *string The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1084,7 +1084,7 @@ Name *string Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1098,7 +1098,7 @@ Algorithm *string Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1112,7 +1112,7 @@ Digits *f64 The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1126,7 +1126,7 @@ Id *string ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1143,7 +1143,7 @@ KeySize *f64 Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1157,7 +1157,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1171,7 +1171,7 @@ Period *f64 The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1185,7 +1185,7 @@ QrSize *f64 The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1201,7 +1201,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mfaTotp.java.md b/docs/mfaTotp.java.md index 07f9383f..0413e56f 100644 --- a/docs/mfaTotp.java.md +++ b/docs/mfaTotp.java.md @@ -4,7 +4,7 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -221,7 +221,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- @@ -704,7 +704,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1255,7 +1255,7 @@ public java.lang.String getIssuer(); The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1269,7 +1269,7 @@ public java.lang.String getName(); Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1283,7 +1283,7 @@ public java.lang.String getAlgorithm(); Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1297,7 +1297,7 @@ public java.lang.Number getDigits(); The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1311,7 +1311,7 @@ public java.lang.String getId(); ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1328,7 +1328,7 @@ public java.lang.Number getKeySize(); Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1342,7 +1342,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1356,7 +1356,7 @@ public java.lang.Number getPeriod(); The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1370,7 +1370,7 @@ public java.lang.Number getQrSize(); The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1386,7 +1386,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mfaTotp.python.md b/docs/mfaTotp.python.md index 981acc0f..27b8604f 100644 --- a/docs/mfaTotp.python.md +++ b/docs/mfaTotp.python.md @@ -4,7 +4,7 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -219,7 +219,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- @@ -748,7 +748,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1295,7 +1295,7 @@ issuer: str The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1309,7 +1309,7 @@ name: str Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1323,7 +1323,7 @@ algorithm: str Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1337,7 +1337,7 @@ digits: typing.Union[int, float] The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1351,7 +1351,7 @@ id: str ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1368,7 +1368,7 @@ key_size: typing.Union[int, float] Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1382,7 +1382,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1396,7 +1396,7 @@ period: typing.Union[int, float] The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1410,7 +1410,7 @@ qr_size: typing.Union[int, float] The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1426,7 +1426,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mfaTotp.typescript.md b/docs/mfaTotp.typescript.md index 8f03ecce..a51018ee 100644 --- a/docs/mfaTotp.typescript.md +++ b/docs/mfaTotp.typescript.md @@ -4,7 +4,7 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1052,7 +1052,7 @@ public readonly issuer: string; The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1066,7 +1066,7 @@ public readonly name: string; Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1080,7 +1080,7 @@ public readonly algorithm: string; Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1094,7 +1094,7 @@ public readonly digits: number; The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1108,7 +1108,7 @@ public readonly id: string; ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1125,7 +1125,7 @@ public readonly keySize: number; Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1139,7 +1139,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1153,7 +1153,7 @@ public readonly period: number; The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1167,7 +1167,7 @@ public readonly qrSize: number; The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1183,7 +1183,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mongodbatlasSecretBackend.csharp.md b/docs/mongodbatlasSecretBackend.csharp.md index 05ab6beb..28effd10 100644 --- a/docs/mongodbatlasSecretBackend.csharp.md +++ b/docs/mongodbatlasSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ new MongodbatlasSecretBackendConfig { | Mount | string | Path where MongoDB Atlas secret backend is mounted. | | PrivateKey | string | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | PublicKey | string | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -919,7 +919,7 @@ public string Mount { get; set; } Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -933,7 +933,7 @@ public string PrivateKey { get; set; } The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -947,7 +947,7 @@ public string PublicKey { get; set; } The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -959,7 +959,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretBackend.go.md b/docs/mongodbatlasSecretBackend.go.md index fbc3b6a5..953b6bd2 100644 --- a/docs/mongodbatlasSecretBackend.go.md +++ b/docs/mongodbatlasSecretBackend.go.md @@ -4,12 +4,12 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretbackend" mongodbatlassecretbackend.NewMongodbatlasSecretBackend(scope Construct, id *string, config MongodbatlasSecretBackendConfig) MongodbatlasSecretBackend ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretbackend" mongodbatlassecretbackend.MongodbatlasSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretbackend" mongodbatlassecretbackend.MongodbatlasSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ mongodbatlassecretbackend.MongodbatlasSecretBackend_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretbackend" mongodbatlassecretbackend.MongodbatlasSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ mongodbatlassecretbackend.MongodbatlasSecretBackend_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretbackend" mongodbatlassecretbackend.MongodbatlasSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -802,7 +802,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretbackend" &mongodbatlassecretbackend.MongodbatlasSecretBackendConfig { Connection: interface{}, @@ -834,7 +834,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretbac | Mount | *string | Path where MongoDB Atlas secret backend is mounted. | | PrivateKey | *string | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | PublicKey | *string | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -919,7 +919,7 @@ Mount *string Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -933,7 +933,7 @@ PrivateKey *string The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -947,7 +947,7 @@ PublicKey *string The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -959,7 +959,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretBackend.java.md b/docs/mongodbatlasSecretBackend.java.md index eac6c856..55873dd6 100644 --- a/docs/mongodbatlasSecretBackend.java.md +++ b/docs/mongodbatlasSecretBackend.java.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers @@ -45,7 +45,7 @@ MongodbatlasSecretBackend.Builder.create(Construct scope, java.lang.String id) | mount | java.lang.String | Path where MongoDB Atlas secret backend is mounted. | | privateKey | java.lang.String | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | publicKey | java.lang.String | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- @@ -598,7 +598,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -955,7 +955,7 @@ MongodbatlasSecretBackendConfig.builder() | mount | java.lang.String | Path where MongoDB Atlas secret backend is mounted. | | privateKey | java.lang.String | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | publicKey | java.lang.String | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1040,7 +1040,7 @@ public java.lang.String getMount(); Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -1054,7 +1054,7 @@ public java.lang.String getPrivateKey(); The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -1068,7 +1068,7 @@ public java.lang.String getPublicKey(); The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -1080,7 +1080,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretBackend.python.md b/docs/mongodbatlasSecretBackend.python.md index e243b775..ccaa7007 100644 --- a/docs/mongodbatlasSecretBackend.python.md +++ b/docs/mongodbatlasSecretBackend.python.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers @@ -43,7 +43,7 @@ mongodbatlasSecretBackend.MongodbatlasSecretBackend( | mount | str | Path where MongoDB Atlas secret backend is mounted. | | private_key | str | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | public_key | str | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- @@ -642,7 +642,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -995,7 +995,7 @@ mongodbatlasSecretBackend.MongodbatlasSecretBackendConfig( | mount | str | Path where MongoDB Atlas secret backend is mounted. | | private_key | str | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | public_key | str | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1080,7 +1080,7 @@ mount: str Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -1094,7 +1094,7 @@ private_key: str The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -1108,7 +1108,7 @@ public_key: str The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -1120,7 +1120,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1137,7 +1137,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretBackend.typescript.md b/docs/mongodbatlasSecretBackend.typescript.md index 77917977..fd7fdac0 100644 --- a/docs/mongodbatlasSecretBackend.typescript.md +++ b/docs/mongodbatlasSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -821,7 +821,7 @@ const mongodbatlasSecretBackendConfig: mongodbatlasSecretBackend.MongodbatlasSec | mount | string | Path where MongoDB Atlas secret backend is mounted. | | privateKey | string | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | publicKey | string | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -906,7 +906,7 @@ public readonly mount: string; Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -920,7 +920,7 @@ public readonly privateKey: string; The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -934,7 +934,7 @@ public readonly publicKey: string; The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -946,7 +946,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -963,7 +963,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretRole.csharp.md b/docs/mongodbatlasSecretRole.csharp.md index 4c44c96f..731659db 100644 --- a/docs/mongodbatlasSecretRole.csharp.md +++ b/docs/mongodbatlasSecretRole.csharp.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1034,7 +1034,7 @@ new MongodbatlasSecretRoleConfig { | Name | string | Name of the role. | | Roles | string[] | List of roles that the API Key needs to have. | | CidrBlocks | string[] | Whitelist entry in CIDR notation to be added for the API key. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | IpAddresses | string[] | IP address to be added to the whitelist for the API key. | | MaxTtl | string | The maximum allowed lifetime of credentials issued using this role. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1125,7 +1125,7 @@ public string Mount { get; set; } Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1139,7 +1139,7 @@ public string Name { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1153,7 +1153,7 @@ public string[] Roles { get; set; } List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1167,7 +1167,7 @@ public string[] CidrBlocks { get; set; } Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1179,7 +1179,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1196,7 +1196,7 @@ public string[] IpAddresses { get; set; } IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1210,7 +1210,7 @@ public string MaxTtl { get; set; } The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1224,7 +1224,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1238,7 +1238,7 @@ public string OrganizationId { get; set; } ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1252,7 +1252,7 @@ public string ProjectId { get; set; } ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1266,7 +1266,7 @@ public string[] ProjectRoles { get; set; } Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1280,7 +1280,7 @@ public string Ttl { get; set; } Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mongodbatlasSecretRole.go.md b/docs/mongodbatlasSecretRole.go.md index 1ffbdb2a..cb9c3e6f 100644 --- a/docs/mongodbatlasSecretRole.go.md +++ b/docs/mongodbatlasSecretRole.go.md @@ -4,12 +4,12 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretrole" mongodbatlassecretrole.NewMongodbatlasSecretRole(scope Construct, id *string, config MongodbatlasSecretRoleConfig) MongodbatlasSecretRole ``` @@ -441,7 +441,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretrole" mongodbatlassecretrole.MongodbatlasSecretRole_IsConstruct(x interface{}) *bool ``` @@ -473,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretrole" mongodbatlassecretrole.MongodbatlasSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +487,7 @@ mongodbatlassecretrole.MongodbatlasSecretRole_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretrole" mongodbatlassecretrole.MongodbatlasSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +501,7 @@ mongodbatlassecretrole.MongodbatlasSecretRole_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretrole" mongodbatlassecretrole.MongodbatlasSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -530,7 +530,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -994,7 +994,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretrole" &mongodbatlassecretrole.MongodbatlasSecretRoleConfig { Connection: interface{}, @@ -1034,7 +1034,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mongodbatlassecretrol | Name | *string | Name of the role. | | Roles | *[]*string | List of roles that the API Key needs to have. | | CidrBlocks | *[]*string | Whitelist entry in CIDR notation to be added for the API key. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | IpAddresses | *[]*string | IP address to be added to the whitelist for the API key. | | MaxTtl | *string | The maximum allowed lifetime of credentials issued using this role. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1125,7 +1125,7 @@ Mount *string Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1139,7 +1139,7 @@ Name *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1153,7 +1153,7 @@ Roles *[]*string List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1167,7 +1167,7 @@ CidrBlocks *[]*string Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1179,7 +1179,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1196,7 +1196,7 @@ IpAddresses *[]*string IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1210,7 +1210,7 @@ MaxTtl *string The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1224,7 +1224,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1238,7 +1238,7 @@ OrganizationId *string ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1252,7 +1252,7 @@ ProjectId *string ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1266,7 +1266,7 @@ ProjectRoles *[]*string Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1280,7 +1280,7 @@ Ttl *string Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mongodbatlasSecretRole.java.md b/docs/mongodbatlasSecretRole.java.md index 7ab51ee3..54f28e81 100644 --- a/docs/mongodbatlasSecretRole.java.md +++ b/docs/mongodbatlasSecretRole.java.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers @@ -53,7 +53,7 @@ MongodbatlasSecretRole.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Name of the role. | | roles | java.util.List | List of roles that the API Key needs to have. | | cidrBlocks | java.util.List | Whitelist entry in CIDR notation to be added for the API key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ipAddresses | java.util.List | IP address to be added to the whitelist for the API key. | | maxTtl | java.lang.String | The maximum allowed lifetime of credentials issued using this role. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- @@ -731,7 +731,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1239,7 +1239,7 @@ MongodbatlasSecretRoleConfig.builder() | name | java.lang.String | Name of the role. | | roles | java.util.List | List of roles that the API Key needs to have. | | cidrBlocks | java.util.List | Whitelist entry in CIDR notation to be added for the API key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ipAddresses | java.util.List | IP address to be added to the whitelist for the API key. | | maxTtl | java.lang.String | The maximum allowed lifetime of credentials issued using this role. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1330,7 +1330,7 @@ public java.lang.String getMount(); Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1344,7 +1344,7 @@ public java.lang.String getName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1358,7 +1358,7 @@ public java.util.List getRoles(); List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1372,7 +1372,7 @@ public java.util.List getCidrBlocks(); Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1384,7 +1384,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1401,7 +1401,7 @@ public java.util.List getIpAddresses(); IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1415,7 +1415,7 @@ public java.lang.String getMaxTtl(); The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1429,7 +1429,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1443,7 +1443,7 @@ public java.lang.String getOrganizationId(); ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1457,7 +1457,7 @@ public java.lang.String getProjectId(); ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1471,7 +1471,7 @@ public java.util.List getProjectRoles(); Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1485,7 +1485,7 @@ public java.lang.String getTtl(); Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mongodbatlasSecretRole.python.md b/docs/mongodbatlasSecretRole.python.md index 5f5c4585..4f03b98a 100644 --- a/docs/mongodbatlasSecretRole.python.md +++ b/docs/mongodbatlasSecretRole.python.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers @@ -51,7 +51,7 @@ mongodbatlasSecretRole.MongodbatlasSecretRole( | name | str | Name of the role. | | roles | typing.List[str] | List of roles that the API Key needs to have. | | cidr_blocks | typing.List[str] | Whitelist entry in CIDR notation to be added for the API key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ip_addresses | typing.List[str] | IP address to be added to the whitelist for the API key. | | max_ttl | str | The maximum allowed lifetime of credentials issued using this role. | | namespace | str | Target namespace. (requires Enterprise). | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- @@ -775,7 +775,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1279,7 +1279,7 @@ mongodbatlasSecretRole.MongodbatlasSecretRoleConfig( | name | str | Name of the role. | | roles | typing.List[str] | List of roles that the API Key needs to have. | | cidr_blocks | typing.List[str] | Whitelist entry in CIDR notation to be added for the API key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ip_addresses | typing.List[str] | IP address to be added to the whitelist for the API key. | | max_ttl | str | The maximum allowed lifetime of credentials issued using this role. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1370,7 +1370,7 @@ mount: str Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1384,7 +1384,7 @@ name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1398,7 +1398,7 @@ roles: typing.List[str] List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1412,7 +1412,7 @@ cidr_blocks: typing.List[str] Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1424,7 +1424,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1441,7 +1441,7 @@ ip_addresses: typing.List[str] IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1455,7 +1455,7 @@ max_ttl: str The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1469,7 +1469,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1483,7 +1483,7 @@ organization_id: str ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1497,7 +1497,7 @@ project_id: str ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1511,7 +1511,7 @@ project_roles: typing.List[str] Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1525,7 +1525,7 @@ ttl: str Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mongodbatlasSecretRole.typescript.md b/docs/mongodbatlasSecretRole.typescript.md index 64ce91fd..0ca74565 100644 --- a/docs/mongodbatlasSecretRole.typescript.md +++ b/docs/mongodbatlasSecretRole.typescript.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1014,7 +1014,7 @@ const mongodbatlasSecretRoleConfig: mongodbatlasSecretRole.MongodbatlasSecretRol | name | string | Name of the role. | | roles | string[] | List of roles that the API Key needs to have. | | cidrBlocks | string[] | Whitelist entry in CIDR notation to be added for the API key. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ipAddresses | string[] | IP address to be added to the whitelist for the API key. | | maxTtl | string | The maximum allowed lifetime of credentials issued using this role. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1105,7 +1105,7 @@ public readonly mount: string; Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1119,7 +1119,7 @@ public readonly name: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1133,7 +1133,7 @@ public readonly roles: string[]; List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1147,7 +1147,7 @@ public readonly cidrBlocks: string[]; Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1159,7 +1159,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1176,7 +1176,7 @@ public readonly ipAddresses: string[]; IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1190,7 +1190,7 @@ public readonly maxTtl: string; The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1204,7 +1204,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1218,7 +1218,7 @@ public readonly organizationId: string; ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1232,7 +1232,7 @@ public readonly projectId: string; ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1246,7 +1246,7 @@ public readonly projectRoles: string[]; Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1260,7 +1260,7 @@ public readonly ttl: string; Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mount.csharp.md b/docs/mount.csharp.md index 82ebe7f5..c6778bb1 100644 --- a/docs/mount.csharp.md +++ b/docs/mount.csharp.md @@ -4,7 +4,7 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount vault_mount}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1116,7 +1116,7 @@ new MountConfig { | DefaultLeaseTtlSeconds | double | Default lease duration for tokens and secrets in seconds. | | Description | string | Human-friendly description of the mount. | | ExternalEntropyAccess | object | Enable the secrets engine to access Vault's external entropy source. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. | | Local | object | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for tokens and secrets in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1205,7 +1205,7 @@ public string Path { get; set; } Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#path Mount#path} --- @@ -1219,7 +1219,7 @@ public string Type { get; set; } Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#type Mount#type} --- @@ -1233,7 +1233,7 @@ public string[] AllowedManagedKeys { get; set; } List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1247,7 +1247,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1261,7 +1261,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1275,7 +1275,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1289,7 +1289,7 @@ public string Description { get; set; } Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#description Mount#description} --- @@ -1303,7 +1303,7 @@ public object ExternalEntropyAccess { get; set; } Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1315,7 +1315,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1332,7 +1332,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#local Mount#local} --- @@ -1346,7 +1346,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1360,7 +1360,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1374,7 +1374,7 @@ public System.Collections.Generic.IDictionary Options { get; set Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#options Mount#options} --- @@ -1388,7 +1388,7 @@ public object SealWrap { get; set; } Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/mount.go.md b/docs/mount.go.md index 41e5cbd5..4d794895 100644 --- a/docs/mount.go.md +++ b/docs/mount.go.md @@ -4,12 +4,12 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount vault_mount}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mount" mount.NewMount(scope Construct, id *string, config MountConfig) Mount ``` @@ -462,7 +462,7 @@ func ResetSealWrap() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mount" mount.Mount_IsConstruct(x interface{}) *bool ``` @@ -494,7 +494,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mount" mount.Mount_IsTerraformElement(x interface{}) *bool ``` @@ -508,7 +508,7 @@ mount.Mount_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mount" mount.Mount_IsTerraformResource(x interface{}) *bool ``` @@ -522,7 +522,7 @@ mount.Mount_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mount" mount.Mount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -551,7 +551,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1070,7 +1070,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mount" &mount.MountConfig { Connection: interface{}, @@ -1116,7 +1116,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/mount" | DefaultLeaseTtlSeconds | *f64 | Default lease duration for tokens and secrets in seconds. | | Description | *string | Human-friendly description of the mount. | | ExternalEntropyAccess | interface{} | Enable the secrets engine to access Vault's external entropy source. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. | | Local | interface{} | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for tokens and secrets in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1205,7 +1205,7 @@ Path *string Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#path Mount#path} --- @@ -1219,7 +1219,7 @@ Type *string Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#type Mount#type} --- @@ -1233,7 +1233,7 @@ AllowedManagedKeys *[]*string List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1247,7 +1247,7 @@ AuditNonHmacRequestKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1261,7 +1261,7 @@ AuditNonHmacResponseKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1275,7 +1275,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1289,7 +1289,7 @@ Description *string Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#description Mount#description} --- @@ -1303,7 +1303,7 @@ ExternalEntropyAccess interface{} Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1315,7 +1315,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1332,7 +1332,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#local Mount#local} --- @@ -1346,7 +1346,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1360,7 +1360,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1374,7 +1374,7 @@ Options *map[string]*string Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#options Mount#options} --- @@ -1388,7 +1388,7 @@ SealWrap interface{} Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/mount.java.md b/docs/mount.java.md index 210ea70a..41fc5bcf 100644 --- a/docs/mount.java.md +++ b/docs/mount.java.md @@ -4,7 +4,7 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount vault_mount}. #### Initializers @@ -62,7 +62,7 @@ Mount.Builder.create(Construct scope, java.lang.String id) | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for tokens and secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -137,7 +137,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#path Mount#path} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#type Mount#type} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#description Mount#description} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -228,7 +228,7 @@ If you experience problems setting this value it might not be settable. Please t Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#local Mount#local} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#namespace Mount#namespace} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#options Mount#options} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- @@ -779,7 +779,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1351,7 +1351,7 @@ MountConfig.builder() | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for tokens and secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1440,7 +1440,7 @@ public java.lang.String getPath(); Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#path Mount#path} --- @@ -1454,7 +1454,7 @@ public java.lang.String getType(); Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#type Mount#type} --- @@ -1468,7 +1468,7 @@ public java.util.List getAllowedManagedKeys(); List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1482,7 +1482,7 @@ public java.util.List getAuditNonHmacRequestKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1496,7 +1496,7 @@ public java.util.List getAuditNonHmacResponseKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1510,7 +1510,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1524,7 +1524,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#description Mount#description} --- @@ -1538,7 +1538,7 @@ public java.lang.Object getExternalEntropyAccess(); Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1550,7 +1550,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1567,7 +1567,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#local Mount#local} --- @@ -1581,7 +1581,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1595,7 +1595,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1609,7 +1609,7 @@ public java.util.Map getOptions(); Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#options Mount#options} --- @@ -1623,7 +1623,7 @@ public java.lang.Object getSealWrap(); Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/mount.python.md b/docs/mount.python.md index 5c712b8d..83e2cd92 100644 --- a/docs/mount.python.md +++ b/docs/mount.python.md @@ -4,7 +4,7 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount vault_mount}. #### Initializers @@ -57,7 +57,7 @@ mount.Mount( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for tokens and secrets in seconds. | | description | str | Human-friendly description of the mount. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#path Mount#path} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#type Mount#type} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#description Mount#description} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -223,7 +223,7 @@ If you experience problems setting this value it might not be settable. Please t Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#local Mount#local} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#namespace Mount#namespace} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#options Mount#options} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- @@ -820,7 +820,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1385,7 +1385,7 @@ mount.MountConfig( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for tokens and secrets in seconds. | | description | str | Human-friendly description of the mount. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1474,7 +1474,7 @@ path: str Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#path Mount#path} --- @@ -1488,7 +1488,7 @@ type: str Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#type Mount#type} --- @@ -1502,7 +1502,7 @@ allowed_managed_keys: typing.List[str] List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1516,7 +1516,7 @@ audit_non_hmac_request_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1530,7 +1530,7 @@ audit_non_hmac_response_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1544,7 +1544,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1558,7 +1558,7 @@ description: str Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#description Mount#description} --- @@ -1572,7 +1572,7 @@ external_entropy_access: typing.Union[bool, IResolvable] Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1584,7 +1584,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1601,7 +1601,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#local Mount#local} --- @@ -1615,7 +1615,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1629,7 +1629,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1643,7 +1643,7 @@ options: typing.Mapping[str] Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#options Mount#options} --- @@ -1657,7 +1657,7 @@ seal_wrap: typing.Union[bool, IResolvable] Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/mount.typescript.md b/docs/mount.typescript.md index 6bda5236..d3b7eaae 100644 --- a/docs/mount.typescript.md +++ b/docs/mount.typescript.md @@ -4,7 +4,7 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount vault_mount}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1094,7 +1094,7 @@ const mountConfig: mount.MountConfig = { ... } | defaultLeaseTtlSeconds | number | Default lease duration for tokens and secrets in seconds. | | description | string | Human-friendly description of the mount. | | externalEntropyAccess | boolean \| cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. | | local | boolean \| cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for tokens and secrets in seconds. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1183,7 +1183,7 @@ public readonly path: string; Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#path Mount#path} --- @@ -1197,7 +1197,7 @@ public readonly type: string; Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#type Mount#type} --- @@ -1211,7 +1211,7 @@ public readonly allowedManagedKeys: string[]; List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1225,7 +1225,7 @@ public readonly auditNonHmacRequestKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1239,7 +1239,7 @@ public readonly auditNonHmacResponseKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1253,7 +1253,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1267,7 +1267,7 @@ public readonly description: string; Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#description Mount#description} --- @@ -1281,7 +1281,7 @@ public readonly externalEntropyAccess: boolean | IResolvable; Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1293,7 +1293,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1310,7 +1310,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#local Mount#local} --- @@ -1324,7 +1324,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1338,7 +1338,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1352,7 +1352,7 @@ public readonly options: {[ key: string ]: string}; Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#options Mount#options} --- @@ -1366,7 +1366,7 @@ public readonly sealWrap: boolean | IResolvable; Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/namespace.csharp.md b/docs/namespace.csharp.md index 8317f94d..be38b9b0 100644 --- a/docs/namespace.csharp.md +++ b/docs/namespace.csharp.md @@ -4,7 +4,7 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace vault_namespace}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -847,7 +847,7 @@ new NamespaceConfig { | Provisioners | object[] | *No description.* | | Path | string | Namespace path. | | CustomMetadata | System.Collections.Generic.IDictionary | Custom metadata describing this namespace. Value type is map[string]string. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | PathFq | string | The fully qualified namespace path. | @@ -933,7 +933,7 @@ public string Path { get; set; } Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path Namespace#path} --- @@ -947,7 +947,7 @@ public System.Collections.Generic.IDictionary CustomMetadata { g Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -959,7 +959,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -990,7 +990,7 @@ public string PathFq { get; set; } The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/namespace.go.md b/docs/namespace.go.md index 04b93300..28389264 100644 --- a/docs/namespace.go.md +++ b/docs/namespace.go.md @@ -4,12 +4,12 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace vault_namespace}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/namespace" namespace.NewNamespace(scope Construct, id *string, config NamespaceConfig) Namespace ``` @@ -406,7 +406,7 @@ func ResetPathFq() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/namespace" namespace.Namespace_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/namespace" namespace.Namespace_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ namespace.Namespace_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/namespace" namespace.Namespace_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ namespace.Namespace_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/namespace" namespace.Namespace_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -816,7 +816,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/namespace" &namespace.NamespaceConfig { Connection: interface{}, @@ -847,7 +847,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/namespace" | Provisioners | *[]interface{} | *No description.* | | Path | *string | Namespace path. | | CustomMetadata | *map[string]*string | Custom metadata describing this namespace. Value type is map[string]string. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | PathFq | *string | The fully qualified namespace path. | @@ -933,7 +933,7 @@ Path *string Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path Namespace#path} --- @@ -947,7 +947,7 @@ CustomMetadata *map[string]*string Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -959,7 +959,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -990,7 +990,7 @@ PathFq *string The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/namespace.java.md b/docs/namespace.java.md index 454bd02c..21c9fca8 100644 --- a/docs/namespace.java.md +++ b/docs/namespace.java.md @@ -4,7 +4,7 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace vault_namespace}. #### Initializers @@ -44,7 +44,7 @@ Namespace.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | path | java.lang.String | Namespace path. | | customMetadata | java.util.Map | Custom metadata describing this namespace. Value type is map[string]string. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pathFq | java.lang.String | The fully qualified namespace path. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path Namespace#path} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path_fq Namespace#path_fq} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -968,7 +968,7 @@ NamespaceConfig.builder() | provisioners | java.util.List | *No description.* | | path | java.lang.String | Namespace path. | | customMetadata | java.util.Map | Custom metadata describing this namespace. Value type is map[string]string. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pathFq | java.lang.String | The fully qualified namespace path. | @@ -1054,7 +1054,7 @@ public java.lang.String getPath(); Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path Namespace#path} --- @@ -1068,7 +1068,7 @@ public java.util.Map getCustomMetadata(); Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -1080,7 +1080,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -1111,7 +1111,7 @@ public java.lang.String getPathFq(); The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/namespace.python.md b/docs/namespace.python.md index 7a52802a..6fc96254 100644 --- a/docs/namespace.python.md +++ b/docs/namespace.python.md @@ -4,7 +4,7 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace vault_namespace}. #### Initializers @@ -42,7 +42,7 @@ namespace.Namespace( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Namespace path. | | custom_metadata | typing.Mapping[str] | Custom metadata describing this namespace. Value type is map[string]string. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path_fq | str | The fully qualified namespace path. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path Namespace#path} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path_fq Namespace#path_fq} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -1008,7 +1008,7 @@ namespace.NamespaceConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Namespace path. | | custom_metadata | typing.Mapping[str] | Custom metadata describing this namespace. Value type is map[string]string. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path_fq | str | The fully qualified namespace path. | @@ -1094,7 +1094,7 @@ path: str Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path Namespace#path} --- @@ -1108,7 +1108,7 @@ custom_metadata: typing.Mapping[str] Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -1120,7 +1120,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1137,7 +1137,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -1151,7 +1151,7 @@ path_fq: str The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/namespace.typescript.md b/docs/namespace.typescript.md index b46a2513..c208f7ad 100644 --- a/docs/namespace.typescript.md +++ b/docs/namespace.typescript.md @@ -4,7 +4,7 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace vault_namespace}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ const namespaceConfig: namespace.NamespaceConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | Namespace path. | | customMetadata | {[ key: string ]: string} | Custom metadata describing this namespace. Value type is map[string]string. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. | | namespace | string | Target namespace. (requires Enterprise). | | pathFq | string | The fully qualified namespace path. | @@ -920,7 +920,7 @@ public readonly path: string; Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path Namespace#path} --- @@ -934,7 +934,7 @@ public readonly customMetadata: {[ key: string ]: string}; Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -946,7 +946,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -963,7 +963,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -977,7 +977,7 @@ public readonly pathFq: string; The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/nomadSecretBackend.csharp.md b/docs/nomadSecretBackend.csharp.md index c660da36..2cac03fd 100644 --- a/docs/nomadSecretBackend.csharp.md +++ b/docs/nomadSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1179,7 +1179,7 @@ new NomadSecretBackendConfig { | DefaultLeaseTtlSeconds | double | Default lease duration for secrets in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | Local | object | Mark the secrets engine as local-only. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for secrets in seconds. | | MaxTokenNameLength | double | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1270,7 +1270,7 @@ public string Address { get; set; } Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1284,7 +1284,7 @@ public string Backend { get; set; } The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1298,7 +1298,7 @@ public string CaCert { get; set; } CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1312,7 +1312,7 @@ public string ClientCert { get; set; } Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1326,7 +1326,7 @@ public string ClientKey { get; set; } Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1340,7 +1340,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1354,7 +1354,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1368,7 +1368,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1380,7 +1380,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1399,7 +1399,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1413,7 +1413,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1429,7 +1429,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1443,7 +1443,7 @@ public double MaxTtl { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1457,7 +1457,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1471,7 +1471,7 @@ public string Token { get; set; } Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1485,7 +1485,7 @@ public double Ttl { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretBackend.go.md b/docs/nomadSecretBackend.go.md index 37c6951b..92ba521d 100644 --- a/docs/nomadSecretBackend.go.md +++ b/docs/nomadSecretBackend.go.md @@ -4,12 +4,12 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretbackend" nomadsecretbackend.NewNomadSecretBackend(scope Construct, id *string, config NomadSecretBackendConfig) NomadSecretBackend ``` @@ -490,7 +490,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretbackend" nomadsecretbackend.NomadSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -522,7 +522,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretbackend" nomadsecretbackend.NomadSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -536,7 +536,7 @@ nomadsecretbackend.NomadSecretBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretbackend" nomadsecretbackend.NomadSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -550,7 +550,7 @@ nomadsecretbackend.NomadSecretBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretbackend" nomadsecretbackend.NomadSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -579,7 +579,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1131,7 +1131,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretbackend" &nomadsecretbackend.NomadSecretBackendConfig { Connection: interface{}, @@ -1179,7 +1179,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretbackend" | DefaultLeaseTtlSeconds | *f64 | Default lease duration for secrets in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | Local | interface{} | Mark the secrets engine as local-only. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for secrets in seconds. | | MaxTokenNameLength | *f64 | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1270,7 +1270,7 @@ Address *string Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1284,7 +1284,7 @@ Backend *string The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1298,7 +1298,7 @@ CaCert *string CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1312,7 +1312,7 @@ ClientCert *string Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1326,7 +1326,7 @@ ClientKey *string Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1340,7 +1340,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1354,7 +1354,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1368,7 +1368,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1380,7 +1380,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1399,7 +1399,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1413,7 +1413,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1429,7 +1429,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1443,7 +1443,7 @@ MaxTtl *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1457,7 +1457,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1471,7 +1471,7 @@ Token *string Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1485,7 +1485,7 @@ Ttl *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretBackend.java.md b/docs/nomadSecretBackend.java.md index 71e6f6cc..28155618 100644 --- a/docs/nomadSecretBackend.java.md +++ b/docs/nomadSecretBackend.java.md @@ -4,7 +4,7 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers @@ -63,7 +63,7 @@ NomadSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Mark the secrets engine as local-only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | maxTokenNameLength | java.lang.Number | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -233,7 +233,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -255,7 +255,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- @@ -834,7 +834,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1440,7 +1440,7 @@ NomadSecretBackendConfig.builder() | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Mark the secrets engine as local-only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | maxTokenNameLength | java.lang.Number | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1531,7 +1531,7 @@ public java.lang.String getAddress(); Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1545,7 +1545,7 @@ public java.lang.String getBackend(); The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1559,7 +1559,7 @@ public java.lang.String getCaCert(); CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1573,7 +1573,7 @@ public java.lang.String getClientCert(); Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1587,7 +1587,7 @@ public java.lang.String getClientKey(); Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1601,7 +1601,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1615,7 +1615,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1629,7 +1629,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1641,7 +1641,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1660,7 +1660,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1674,7 +1674,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1690,7 +1690,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1704,7 +1704,7 @@ public java.lang.Number getMaxTtl(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1718,7 +1718,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1732,7 +1732,7 @@ public java.lang.String getToken(); Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1746,7 +1746,7 @@ public java.lang.Number getTtl(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretBackend.python.md b/docs/nomadSecretBackend.python.md index c412f858..f0799e53 100644 --- a/docs/nomadSecretBackend.python.md +++ b/docs/nomadSecretBackend.python.md @@ -4,7 +4,7 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers @@ -59,7 +59,7 @@ nomadSecretBackend.NomadSecretBackend( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Mark the secrets engine as local-only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | max_token_name_length | typing.Union[int, float] | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -229,7 +229,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -251,7 +251,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- @@ -876,7 +876,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1476,7 +1476,7 @@ nomadSecretBackend.NomadSecretBackendConfig( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Mark the secrets engine as local-only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | max_token_name_length | typing.Union[int, float] | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1567,7 +1567,7 @@ address: str Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1581,7 +1581,7 @@ backend: str The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1595,7 +1595,7 @@ ca_cert: str CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1609,7 +1609,7 @@ client_cert: str Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1623,7 +1623,7 @@ client_key: str Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1637,7 +1637,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1651,7 +1651,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1665,7 +1665,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1677,7 +1677,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1696,7 +1696,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1710,7 +1710,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1726,7 +1726,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1740,7 +1740,7 @@ max_ttl: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1754,7 +1754,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1768,7 +1768,7 @@ token: str Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1782,7 +1782,7 @@ ttl: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretBackend.typescript.md b/docs/nomadSecretBackend.typescript.md index 2bec374c..331f0bad 100644 --- a/docs/nomadSecretBackend.typescript.md +++ b/docs/nomadSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1155,7 +1155,7 @@ const nomadSecretBackendConfig: nomadSecretBackend.NomadSecretBackendConfig = { | defaultLeaseTtlSeconds | number | Default lease duration for secrets in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | boolean \| cdktf.IResolvable | Mark the secrets engine as local-only. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for secrets in seconds. | | maxTokenNameLength | number | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1246,7 +1246,7 @@ public readonly address: string; Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1260,7 +1260,7 @@ public readonly backend: string; The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1274,7 +1274,7 @@ public readonly caCert: string; CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1288,7 +1288,7 @@ public readonly clientCert: string; Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1302,7 +1302,7 @@ public readonly clientKey: string; Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1316,7 +1316,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1330,7 +1330,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1344,7 +1344,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1356,7 +1356,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1375,7 +1375,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1389,7 +1389,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1405,7 +1405,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1419,7 +1419,7 @@ public readonly maxTtl: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1433,7 +1433,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1447,7 +1447,7 @@ public readonly token: string; Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1461,7 +1461,7 @@ public readonly ttl: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretRole.csharp.md b/docs/nomadSecretRole.csharp.md index 6fa435d4..27b382e9 100644 --- a/docs/nomadSecretRole.csharp.md +++ b/docs/nomadSecretRole.csharp.md @@ -4,7 +4,7 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -890,7 +890,7 @@ new NomadSecretRoleConfig { | Backend | string | The mount path for the Nomad backend. | | Role | string | Name of the role. | | Global | object | Specifies if the token should be global. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Comma separated list of Nomad policies the token is going to be created against. | | Type | string | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -977,7 +977,7 @@ public string Backend { get; set; } The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -991,7 +991,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -1005,7 +1005,7 @@ public object Global { get; set; } Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1017,7 +1017,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1050,7 +1050,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1064,7 +1064,7 @@ public string Type { get; set; } Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/nomadSecretRole.go.md b/docs/nomadSecretRole.go.md index 6a5a398c..ceed32cf 100644 --- a/docs/nomadSecretRole.go.md +++ b/docs/nomadSecretRole.go.md @@ -4,12 +4,12 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretrole" nomadsecretrole.NewNomadSecretRole(scope Construct, id *string, config NomadSecretRoleConfig) NomadSecretRole ``` @@ -413,7 +413,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretrole" nomadsecretrole.NomadSecretRole_IsConstruct(x interface{}) *bool ``` @@ -445,7 +445,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretrole" nomadsecretrole.NomadSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +459,7 @@ nomadsecretrole.NomadSecretRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretrole" nomadsecretrole.NomadSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +473,7 @@ nomadsecretrole.NomadSecretRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretrole" nomadsecretrole.NomadSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +502,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -856,7 +856,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretrole" &nomadsecretrole.NomadSecretRoleConfig { Connection: interface{}, @@ -890,7 +890,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/nomadsecretrole" | Backend | *string | The mount path for the Nomad backend. | | Role | *string | Name of the role. | | Global | interface{} | Specifies if the token should be global. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Comma separated list of Nomad policies the token is going to be created against. | | Type | *string | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -977,7 +977,7 @@ Backend *string The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -991,7 +991,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -1005,7 +1005,7 @@ Global interface{} Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1017,7 +1017,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1050,7 +1050,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1064,7 +1064,7 @@ Type *string Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/nomadSecretRole.java.md b/docs/nomadSecretRole.java.md index 63526456..b25c99a6 100644 --- a/docs/nomadSecretRole.java.md +++ b/docs/nomadSecretRole.java.md @@ -4,7 +4,7 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers @@ -48,7 +48,7 @@ NomadSecretRole.Builder.create(Construct scope, java.lang.String id) | backend | java.lang.String | The mount path for the Nomad backend. | | role | java.lang.String | Name of the role. | | global | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the token should be global. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Comma separated list of Nomad policies the token is going to be created against. | | type | java.lang.String | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -162,7 +162,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -174,7 +174,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- @@ -646,7 +646,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1039,7 +1039,7 @@ NomadSecretRoleConfig.builder() | backend | java.lang.String | The mount path for the Nomad backend. | | role | java.lang.String | Name of the role. | | global | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the token should be global. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Comma separated list of Nomad policies the token is going to be created against. | | type | java.lang.String | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -1126,7 +1126,7 @@ public java.lang.String getBackend(); The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -1140,7 +1140,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -1154,7 +1154,7 @@ public java.lang.Object getGlobal(); Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1166,7 +1166,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1199,7 +1199,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1213,7 +1213,7 @@ public java.lang.String getType(); Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/nomadSecretRole.python.md b/docs/nomadSecretRole.python.md index eb76884b..726cdb1f 100644 --- a/docs/nomadSecretRole.python.md +++ b/docs/nomadSecretRole.python.md @@ -4,7 +4,7 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers @@ -45,7 +45,7 @@ nomadSecretRole.NomadSecretRole( | backend | str | The mount path for the Nomad backend. | | role | str | Name of the role. | | global | typing.Union[bool, cdktf.IResolvable] | Specifies if the token should be global. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Comma separated list of Nomad policies the token is going to be created against. | | type | str | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -171,7 +171,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- @@ -689,7 +689,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1077,7 +1077,7 @@ nomadSecretRole.NomadSecretRoleConfig( | backend | str | The mount path for the Nomad backend. | | role | str | Name of the role. | | global | typing.Union[bool, cdktf.IResolvable] | Specifies if the token should be global. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Comma separated list of Nomad policies the token is going to be created against. | | type | str | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -1164,7 +1164,7 @@ backend: str The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -1178,7 +1178,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -1192,7 +1192,7 @@ global: typing.Union[bool, IResolvable] Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1204,7 +1204,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1221,7 +1221,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1237,7 +1237,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1251,7 +1251,7 @@ type: str Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/nomadSecretRole.typescript.md b/docs/nomadSecretRole.typescript.md index 77ab18cd..585b949e 100644 --- a/docs/nomadSecretRole.typescript.md +++ b/docs/nomadSecretRole.typescript.md @@ -4,7 +4,7 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ const nomadSecretRoleConfig: nomadSecretRole.NomadSecretRoleConfig = { ... } | backend | string | The mount path for the Nomad backend. | | role | string | Name of the role. | | global | boolean \| cdktf.IResolvable | Specifies if the token should be global. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Comma separated list of Nomad policies the token is going to be created against. | | type | string | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -962,7 +962,7 @@ public readonly backend: string; The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -976,7 +976,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -990,7 +990,7 @@ public readonly global: boolean | IResolvable; Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1002,7 +1002,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1019,7 +1019,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1035,7 +1035,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1049,7 +1049,7 @@ public readonly type: string; Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/oktaAuthBackend.csharp.md b/docs/oktaAuthBackend.csharp.md index 9c42dc79..60c5a2ec 100644 --- a/docs/oktaAuthBackend.csharp.md +++ b/docs/oktaAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers @@ -577,7 +577,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1116,14 +1116,14 @@ new OktaAuthBackendConfig { | BypassOktaMfa | object | When true, requests by Okta for a MFA check will be bypassed. | | Description | string | The description of the auth backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Group | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| Group | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | MaxTtl | string | Maximum duration after which authentication will be expired. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | path to mount the backend. | | Token | string | The Okta API token. | | Ttl | string | Duration after which authentication will be expired. | -| User | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| User | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1207,7 +1207,7 @@ public string Organization { get; set; } The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1221,7 +1221,7 @@ public string BaseUrl { get; set; } The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1237,7 +1237,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1251,7 +1251,7 @@ public string Description { get; set; } The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1265,7 +1265,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1277,7 +1277,7 @@ public object Group { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1289,7 +1289,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1306,7 +1306,7 @@ public string MaxTtl { get; set; } Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1320,7 +1320,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1334,7 +1334,7 @@ public string Path { get; set; } path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1350,7 +1350,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -1364,7 +1364,7 @@ public string Ttl { get; set; } Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -1376,7 +1376,7 @@ public object User { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -1397,8 +1397,8 @@ new OktaAuthBackendGroup { | **Name** | **Type** | **Description** | | --- | --- | --- | -| GroupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| GroupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -1410,7 +1410,7 @@ public string GroupName { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -1422,7 +1422,7 @@ public string[] Policies { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1444,9 +1444,9 @@ new OktaAuthBackendUser { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| Username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| Groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| Username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -1458,7 +1458,7 @@ public string[] Groups { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -1470,7 +1470,7 @@ public string[] Policies { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1482,7 +1482,7 @@ public string Username { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- diff --git a/docs/oktaAuthBackend.go.md b/docs/oktaAuthBackend.go.md index ce76a764..a31022a6 100644 --- a/docs/oktaAuthBackend.go.md +++ b/docs/oktaAuthBackend.go.md @@ -4,12 +4,12 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" oktaauthbackend.NewOktaAuthBackend(scope Construct, id *string, config OktaAuthBackendConfig) OktaAuthBackend ``` @@ -488,7 +488,7 @@ func ResetUser() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" oktaauthbackend.OktaAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -520,7 +520,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" oktaauthbackend.OktaAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -534,7 +534,7 @@ oktaauthbackend.OktaAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" oktaauthbackend.OktaAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -548,7 +548,7 @@ oktaauthbackend.OktaAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" oktaauthbackend.OktaAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -577,7 +577,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1074,7 +1074,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" &oktaauthbackend.OktaAuthBackendConfig { Connection: interface{}, @@ -1116,14 +1116,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" | BypassOktaMfa | interface{} | When true, requests by Okta for a MFA check will be bypassed. | | Description | *string | The description of the auth backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Group | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| Group | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | MaxTtl | *string | Maximum duration after which authentication will be expired. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | path to mount the backend. | | Token | *string | The Okta API token. | | Ttl | *string | Duration after which authentication will be expired. | -| User | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| User | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1207,7 +1207,7 @@ Organization *string The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1221,7 +1221,7 @@ BaseUrl *string The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1237,7 +1237,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1251,7 +1251,7 @@ Description *string The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1265,7 +1265,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1277,7 +1277,7 @@ Group interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1289,7 +1289,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1306,7 +1306,7 @@ MaxTtl *string Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1320,7 +1320,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1334,7 +1334,7 @@ Path *string path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1350,7 +1350,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -1364,7 +1364,7 @@ Ttl *string Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -1376,7 +1376,7 @@ User interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -1385,7 +1385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" &oktaauthbackend.OktaAuthBackendGroup { GroupName: *string, @@ -1397,8 +1397,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| GroupName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| GroupName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -1410,7 +1410,7 @@ GroupName *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -1422,7 +1422,7 @@ Policies *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1431,7 +1431,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" &oktaauthbackend.OktaAuthBackendUser { Groups: *[]*string, @@ -1444,9 +1444,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| Groups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| Username | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| Groups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| Username | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -1458,7 +1458,7 @@ Groups *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -1470,7 +1470,7 @@ Policies *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1482,7 +1482,7 @@ Username *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- @@ -1493,7 +1493,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" oktaauthbackend.NewOktaAuthBackendGroupList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) OktaAuthBackendGroupList ``` @@ -1653,7 +1653,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" oktaauthbackend.NewOktaAuthBackendGroupOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) OktaAuthBackendGroupOutputReference ``` @@ -1978,7 +1978,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" oktaauthbackend.NewOktaAuthBackendUserList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) OktaAuthBackendUserList ``` @@ -2138,7 +2138,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" oktaauthbackend.NewOktaAuthBackendUserOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) OktaAuthBackendUserOutputReference ``` diff --git a/docs/oktaAuthBackend.java.md b/docs/oktaAuthBackend.java.md index d2d7adb3..ee2bec66 100644 --- a/docs/oktaAuthBackend.java.md +++ b/docs/oktaAuthBackend.java.md @@ -4,7 +4,7 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers @@ -59,14 +59,14 @@ OktaAuthBackend.Builder.create(Construct scope, java.lang.String id) | bypassOktaMfa | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When true, requests by Okta for a MFA check will be bypassed. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| group | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | maxTtl | java.lang.String | Maximum duration after which authentication will be expired. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | path to mount the backend. | | token | java.lang.String | The Okta API token. | | ttl | java.lang.String | Duration after which authentication will be expired. | -| user | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -158,7 +158,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -207,7 +207,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -239,7 +239,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -794,7 +794,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1341,14 +1341,14 @@ OktaAuthBackendConfig.builder() | bypassOktaMfa | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When true, requests by Okta for a MFA check will be bypassed. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| group | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | maxTtl | java.lang.String | Maximum duration after which authentication will be expired. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | path to mount the backend. | | token | java.lang.String | The Okta API token. | | ttl | java.lang.String | Duration after which authentication will be expired. | -| user | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1432,7 +1432,7 @@ public java.lang.String getOrganization(); The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1446,7 +1446,7 @@ public java.lang.String getBaseUrl(); The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1462,7 +1462,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1476,7 +1476,7 @@ public java.lang.String getDescription(); The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1490,7 +1490,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1502,7 +1502,7 @@ public java.lang.Object getGroup(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1514,7 +1514,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1531,7 +1531,7 @@ public java.lang.String getMaxTtl(); Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1545,7 +1545,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1559,7 +1559,7 @@ public java.lang.String getPath(); path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1575,7 +1575,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -1589,7 +1589,7 @@ public java.lang.String getTtl(); Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -1601,7 +1601,7 @@ public java.lang.Object getUser(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -1622,8 +1622,8 @@ OktaAuthBackendGroup.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| groupName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| groupName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -1635,7 +1635,7 @@ public java.lang.String getGroupName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -1647,7 +1647,7 @@ public java.util.List getPolicies(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1669,9 +1669,9 @@ OktaAuthBackendUser.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -1683,7 +1683,7 @@ public java.util.List getGroups(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -1695,7 +1695,7 @@ public java.util.List getPolicies(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1707,7 +1707,7 @@ public java.lang.String getUsername(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- diff --git a/docs/oktaAuthBackend.python.md b/docs/oktaAuthBackend.python.md index 7645a8d3..1294baec 100644 --- a/docs/oktaAuthBackend.python.md +++ b/docs/oktaAuthBackend.python.md @@ -4,7 +4,7 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers @@ -53,14 +53,14 @@ oktaAuthBackend.OktaAuthBackend( | bypass_okta_mfa | typing.Union[bool, cdktf.IResolvable] | When true, requests by Okta for a MFA check will be bypassed. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| group | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | max_ttl | str | Maximum duration after which authentication will be expired. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | path to mount the backend. | | token | str | The Okta API token. | | ttl | str | Duration after which authentication will be expired. | -| user | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -152,7 +152,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -233,7 +233,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -838,7 +838,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1377,14 +1377,14 @@ oktaAuthBackend.OktaAuthBackendConfig( | bypass_okta_mfa | typing.Union[bool, cdktf.IResolvable] | When true, requests by Okta for a MFA check will be bypassed. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| group | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | max_ttl | str | Maximum duration after which authentication will be expired. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | path to mount the backend. | | token | str | The Okta API token. | | ttl | str | Duration after which authentication will be expired. | -| user | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1468,7 +1468,7 @@ organization: str The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1482,7 +1482,7 @@ base_url: str The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1498,7 +1498,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1512,7 +1512,7 @@ description: str The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1526,7 +1526,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1538,7 +1538,7 @@ group: typing.Union[IResolvable, typing.List[OktaAuthBackendGroup]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1550,7 +1550,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1567,7 +1567,7 @@ max_ttl: str Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1581,7 +1581,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1595,7 +1595,7 @@ path: str path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1611,7 +1611,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -1625,7 +1625,7 @@ ttl: str Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -1637,7 +1637,7 @@ user: typing.Union[IResolvable, typing.List[OktaAuthBackendUser]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -1658,8 +1658,8 @@ oktaAuthBackend.OktaAuthBackendGroup( | **Name** | **Type** | **Description** | | --- | --- | --- | -| group_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| group_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -1671,7 +1671,7 @@ group_name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -1683,7 +1683,7 @@ policies: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1705,9 +1705,9 @@ oktaAuthBackend.OktaAuthBackendUser( | **Name** | **Type** | **Description** | | --- | --- | --- | -| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -1719,7 +1719,7 @@ groups: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -1731,7 +1731,7 @@ policies: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1743,7 +1743,7 @@ username: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- diff --git a/docs/oktaAuthBackend.typescript.md b/docs/oktaAuthBackend.typescript.md index 663f4fd1..a8333632 100644 --- a/docs/oktaAuthBackend.typescript.md +++ b/docs/oktaAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers @@ -577,7 +577,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1095,14 +1095,14 @@ const oktaAuthBackendConfig: oktaAuthBackend.OktaAuthBackendConfig = { ... } | bypassOktaMfa | boolean \| cdktf.IResolvable | When true, requests by Okta for a MFA check will be bypassed. | | description | string | The description of the auth backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| group | cdktf.IResolvable \| OktaAuthBackendGroup[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | cdktf.IResolvable \| OktaAuthBackendGroup[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | maxTtl | string | Maximum duration after which authentication will be expired. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | path to mount the backend. | | token | string | The Okta API token. | | ttl | string | Duration after which authentication will be expired. | -| user | cdktf.IResolvable \| OktaAuthBackendUser[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | cdktf.IResolvable \| OktaAuthBackendUser[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1186,7 +1186,7 @@ public readonly organization: string; The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1200,7 +1200,7 @@ public readonly baseUrl: string; The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1216,7 +1216,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1230,7 +1230,7 @@ public readonly description: string; The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1244,7 +1244,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1256,7 +1256,7 @@ public readonly group: IResolvable | OktaAuthBackendGroup[]; - *Type:* cdktf.IResolvable | OktaAuthBackendGroup[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1268,7 +1268,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1285,7 +1285,7 @@ public readonly maxTtl: string; Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1299,7 +1299,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1313,7 +1313,7 @@ public readonly path: string; path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1329,7 +1329,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -1343,7 +1343,7 @@ public readonly ttl: string; Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -1355,7 +1355,7 @@ public readonly user: IResolvable | OktaAuthBackendUser[]; - *Type:* cdktf.IResolvable | OktaAuthBackendUser[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -1373,8 +1373,8 @@ const oktaAuthBackendGroup: oktaAuthBackend.OktaAuthBackendGroup = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| groupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| groupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -1386,7 +1386,7 @@ public readonly groupName: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -1398,7 +1398,7 @@ public readonly policies: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1416,9 +1416,9 @@ const oktaAuthBackendUser: oktaAuthBackend.OktaAuthBackendUser = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -1430,7 +1430,7 @@ public readonly groups: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -1442,7 +1442,7 @@ public readonly policies: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1454,7 +1454,7 @@ public readonly username: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- diff --git a/docs/oktaAuthBackendGroup.csharp.md b/docs/oktaAuthBackendGroup.csharp.md index 2da786de..1c974b4b 100644 --- a/docs/oktaAuthBackendGroup.csharp.md +++ b/docs/oktaAuthBackendGroup.csharp.md @@ -4,7 +4,7 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -829,7 +829,7 @@ new OktaAuthBackendGroupAConfig { | Provisioners | object[] | *No description.* | | GroupName | string | Name of the Okta group. | | Path | string | Path to the Okta auth backend. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Policies to associate with this group. | @@ -915,7 +915,7 @@ public string GroupName { get; set; } Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -929,7 +929,7 @@ public string Path { get; set; } Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -941,7 +941,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -958,7 +958,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -972,7 +972,7 @@ public string[] Policies { get; set; } Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendGroup.go.md b/docs/oktaAuthBackendGroup.go.md index 7c35c85b..83aa9fb1 100644 --- a/docs/oktaAuthBackendGroup.go.md +++ b/docs/oktaAuthBackendGroup.go.md @@ -4,12 +4,12 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackendgroup" oktaauthbackendgroup.NewOktaAuthBackendGroupA(scope Construct, id *string, config OktaAuthBackendGroupAConfig) OktaAuthBackendGroupA ``` @@ -399,7 +399,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackendgroup" oktaauthbackendgroup.OktaAuthBackendGroupA_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackendgroup" oktaauthbackendgroup.OktaAuthBackendGroupA_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ oktaauthbackendgroup.OktaAuthBackendGroupA_IsTerraformElement(x interface{}) *bo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackendgroup" oktaauthbackendgroup.OktaAuthBackendGroupA_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ oktaauthbackendgroup.OktaAuthBackendGroupA_IsTerraformResource(x interface{}) *b ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackendgroup" oktaauthbackendgroup.OktaAuthBackendGroupA_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -798,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackendgroup" &oktaauthbackendgroup.OktaAuthBackendGroupAConfig { Connection: interface{}, @@ -829,7 +829,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackendgroup" | Provisioners | *[]interface{} | *No description.* | | GroupName | *string | Name of the Okta group. | | Path | *string | Path to the Okta auth backend. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Policies to associate with this group. | @@ -915,7 +915,7 @@ GroupName *string Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -929,7 +929,7 @@ Path *string Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -941,7 +941,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -958,7 +958,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -972,7 +972,7 @@ Policies *[]*string Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendGroup.java.md b/docs/oktaAuthBackendGroup.java.md index 64c4a78a..566e8c40 100644 --- a/docs/oktaAuthBackendGroup.java.md +++ b/docs/oktaAuthBackendGroup.java.md @@ -4,7 +4,7 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers @@ -44,7 +44,7 @@ OktaAuthBackendGroupA.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | groupName | java.lang.String | Name of the Okta group. | | path | java.lang.String | Path to the Okta auth backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to associate with this group. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- @@ -605,7 +605,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -950,7 +950,7 @@ OktaAuthBackendGroupAConfig.builder() | provisioners | java.util.List | *No description.* | | groupName | java.lang.String | Name of the Okta group. | | path | java.lang.String | Path to the Okta auth backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to associate with this group. | @@ -1036,7 +1036,7 @@ public java.lang.String getGroupName(); Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -1050,7 +1050,7 @@ public java.lang.String getPath(); Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -1062,7 +1062,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1079,7 +1079,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -1093,7 +1093,7 @@ public java.util.List getPolicies(); Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendGroup.python.md b/docs/oktaAuthBackendGroup.python.md index 4c464227..7b745397 100644 --- a/docs/oktaAuthBackendGroup.python.md +++ b/docs/oktaAuthBackendGroup.python.md @@ -4,7 +4,7 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers @@ -42,7 +42,7 @@ oktaAuthBackendGroup.OktaAuthBackendGroupA( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_name | str | Name of the Okta group. | | path | str | Path to the Okta auth backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to associate with this group. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -990,7 +990,7 @@ oktaAuthBackendGroup.OktaAuthBackendGroupAConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_name | str | Name of the Okta group. | | path | str | Path to the Okta auth backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to associate with this group. | @@ -1076,7 +1076,7 @@ group_name: str Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -1090,7 +1090,7 @@ path: str Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -1102,7 +1102,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1119,7 +1119,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -1133,7 +1133,7 @@ policies: typing.List[str] Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendGroup.typescript.md b/docs/oktaAuthBackendGroup.typescript.md index 26ddfa82..e475a4cb 100644 --- a/docs/oktaAuthBackendGroup.typescript.md +++ b/docs/oktaAuthBackendGroup.typescript.md @@ -4,7 +4,7 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -816,7 +816,7 @@ const oktaAuthBackendGroupAConfig: oktaAuthBackendGroup.OktaAuthBackendGroupACon | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | groupName | string | Name of the Okta group. | | path | string | Path to the Okta auth backend. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Policies to associate with this group. | @@ -902,7 +902,7 @@ public readonly groupName: string; Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -916,7 +916,7 @@ public readonly path: string; Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -928,7 +928,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -945,7 +945,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -959,7 +959,7 @@ public readonly policies: string[]; Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendUser.csharp.md b/docs/oktaAuthBackendUser.csharp.md index 7e2558a5..edf12e07 100644 --- a/docs/oktaAuthBackendUser.csharp.md +++ b/docs/oktaAuthBackendUser.csharp.md @@ -4,7 +4,7 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -860,7 +860,7 @@ new OktaAuthBackendUserAConfig { | Path | string | Path to the Okta auth backend. | | Username | string | Name of the user within Okta. | | Groups | string[] | Groups within the Okta auth backend to associate with this user. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Policies to associate with this user. | @@ -946,7 +946,7 @@ public string Path { get; set; } Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -960,7 +960,7 @@ public string Username { get; set; } Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -974,7 +974,7 @@ public string[] Groups { get; set; } Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -986,7 +986,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1017,7 +1017,7 @@ public string[] Policies { get; set; } Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/oktaAuthBackendUser.go.md b/docs/oktaAuthBackendUser.go.md index 73ce5896..1d0a5c5f 100644 --- a/docs/oktaAuthBackendUser.go.md +++ b/docs/oktaAuthBackendUser.go.md @@ -4,12 +4,12 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackenduser" oktaauthbackenduser.NewOktaAuthBackendUserA(scope Construct, id *string, config OktaAuthBackendUserAConfig) OktaAuthBackendUserA ``` @@ -406,7 +406,7 @@ func ResetPolicies() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackenduser" oktaauthbackenduser.OktaAuthBackendUserA_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackenduser" oktaauthbackenduser.OktaAuthBackendUserA_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ oktaauthbackenduser.OktaAuthBackendUserA_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackenduser" oktaauthbackenduser.OktaAuthBackendUserA_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ oktaauthbackenduser.OktaAuthBackendUserA_IsTerraformResource(x interface{}) *boo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackenduser" oktaauthbackenduser.OktaAuthBackendUserA_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -827,7 +827,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackenduser" &oktaauthbackenduser.OktaAuthBackendUserAConfig { Connection: interface{}, @@ -860,7 +860,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/oktaauthbackenduser" | Path | *string | Path to the Okta auth backend. | | Username | *string | Name of the user within Okta. | | Groups | *[]*string | Groups within the Okta auth backend to associate with this user. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Policies to associate with this user. | @@ -946,7 +946,7 @@ Path *string Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -960,7 +960,7 @@ Username *string Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -974,7 +974,7 @@ Groups *[]*string Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -986,7 +986,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1017,7 +1017,7 @@ Policies *[]*string Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/oktaAuthBackendUser.java.md b/docs/oktaAuthBackendUser.java.md index c833b82e..11af9412 100644 --- a/docs/oktaAuthBackendUser.java.md +++ b/docs/oktaAuthBackendUser.java.md @@ -4,7 +4,7 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers @@ -46,7 +46,7 @@ OktaAuthBackendUserA.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Path to the Okta auth backend. | | username | java.lang.String | Name of the user within Okta. | | groups | java.util.List | Groups within the Okta auth backend to associate with this user. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to associate with this user. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- @@ -624,7 +624,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -993,7 +993,7 @@ OktaAuthBackendUserAConfig.builder() | path | java.lang.String | Path to the Okta auth backend. | | username | java.lang.String | Name of the user within Okta. | | groups | java.util.List | Groups within the Okta auth backend to associate with this user. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to associate with this user. | @@ -1079,7 +1079,7 @@ public java.lang.String getPath(); Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -1093,7 +1093,7 @@ public java.lang.String getUsername(); Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -1107,7 +1107,7 @@ public java.util.List getGroups(); Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -1119,7 +1119,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1150,7 +1150,7 @@ public java.util.List getPolicies(); Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/oktaAuthBackendUser.python.md b/docs/oktaAuthBackendUser.python.md index 073929a0..ba0609ca 100644 --- a/docs/oktaAuthBackendUser.python.md +++ b/docs/oktaAuthBackendUser.python.md @@ -4,7 +4,7 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers @@ -44,7 +44,7 @@ oktaAuthBackendUser.OktaAuthBackendUserA( | path | str | Path to the Okta auth backend. | | username | str | Name of the user within Okta. | | groups | typing.List[str] | Groups within the Okta auth backend to associate with this user. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to associate with this user. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- @@ -668,7 +668,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -1033,7 +1033,7 @@ oktaAuthBackendUser.OktaAuthBackendUserAConfig( | path | str | Path to the Okta auth backend. | | username | str | Name of the user within Okta. | | groups | typing.List[str] | Groups within the Okta auth backend to associate with this user. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to associate with this user. | @@ -1119,7 +1119,7 @@ path: str Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -1133,7 +1133,7 @@ username: str Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -1147,7 +1147,7 @@ groups: typing.List[str] Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -1159,7 +1159,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1176,7 +1176,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1190,7 +1190,7 @@ policies: typing.List[str] Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/oktaAuthBackendUser.typescript.md b/docs/oktaAuthBackendUser.typescript.md index 022c6f86..f676fc18 100644 --- a/docs/oktaAuthBackendUser.typescript.md +++ b/docs/oktaAuthBackendUser.typescript.md @@ -4,7 +4,7 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -846,7 +846,7 @@ const oktaAuthBackendUserAConfig: oktaAuthBackendUser.OktaAuthBackendUserAConfig | path | string | Path to the Okta auth backend. | | username | string | Name of the user within Okta. | | groups | string[] | Groups within the Okta auth backend to associate with this user. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Policies to associate with this user. | @@ -932,7 +932,7 @@ public readonly path: string; Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -946,7 +946,7 @@ public readonly username: string; Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -960,7 +960,7 @@ public readonly groups: string[]; Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -972,7 +972,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1003,7 +1003,7 @@ public readonly policies: string[]; Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/passwordPolicy.csharp.md b/docs/passwordPolicy.csharp.md index 3ab72a7b..40976c63 100644 --- a/docs/passwordPolicy.csharp.md +++ b/docs/passwordPolicy.csharp.md @@ -4,7 +4,7 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy vault_password_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ new PasswordPolicyConfig { | Provisioners | object[] | *No description.* | | Name | string | Name of the password policy. | | Policy | string | The password policy document. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ public string Name { get; set; } Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -898,7 +898,7 @@ public string Policy { get; set; } The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -910,7 +910,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/passwordPolicy.go.md b/docs/passwordPolicy.go.md index aad489e6..06aea7fb 100644 --- a/docs/passwordPolicy.go.md +++ b/docs/passwordPolicy.go.md @@ -4,12 +4,12 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy vault_password_policy}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/passwordpolicy" passwordpolicy.NewPasswordPolicy(scope Construct, id *string, config PasswordPolicyConfig) PasswordPolicy ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/passwordpolicy" passwordpolicy.PasswordPolicy_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/passwordpolicy" passwordpolicy.PasswordPolicy_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ passwordpolicy.PasswordPolicy_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/passwordpolicy" passwordpolicy.PasswordPolicy_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ passwordpolicy.PasswordPolicy_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/passwordpolicy" passwordpolicy.PasswordPolicy_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/passwordpolicy" &passwordpolicy.PasswordPolicyConfig { Connection: interface{}, @@ -799,7 +799,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/passwordpolicy" | Provisioners | *[]interface{} | *No description.* | | Name | *string | Name of the password policy. | | Policy | *string | The password policy document. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ Name *string Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -898,7 +898,7 @@ Policy *string The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -910,7 +910,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/passwordPolicy.java.md b/docs/passwordPolicy.java.md index 60237050..7cd84906 100644 --- a/docs/passwordPolicy.java.md +++ b/docs/passwordPolicy.java.md @@ -4,7 +4,7 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy vault_password_policy}. #### Initializers @@ -43,7 +43,7 @@ PasswordPolicy.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | Name of the password policy. | | policy | java.lang.String | The password policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ PasswordPolicyConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | Name of the password policy. | | policy | java.lang.String | The password policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ public java.lang.String getName(); Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -1007,7 +1007,7 @@ public java.lang.String getPolicy(); The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -1019,7 +1019,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/passwordPolicy.python.md b/docs/passwordPolicy.python.md index ba7b1ee3..38bf699d 100644 --- a/docs/passwordPolicy.python.md +++ b/docs/passwordPolicy.python.md @@ -4,7 +4,7 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy vault_password_policy}. #### Initializers @@ -41,7 +41,7 @@ passwordPolicy.PasswordPolicy( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | Name of the password policy. | | policy | str | The password policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -948,7 +948,7 @@ passwordPolicy.PasswordPolicyConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | Name of the password policy. | | policy | str | The password policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1033,7 +1033,7 @@ name: str Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -1047,7 +1047,7 @@ policy: str The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -1059,7 +1059,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/passwordPolicy.typescript.md b/docs/passwordPolicy.typescript.md index 1b07abc9..405f0fc6 100644 --- a/docs/passwordPolicy.typescript.md +++ b/docs/passwordPolicy.typescript.md @@ -4,7 +4,7 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy vault_password_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ const passwordPolicyConfig: passwordPolicy.PasswordPolicyConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | Name of the password policy. | | policy | string | The password policy document. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ public readonly name: string; Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -886,7 +886,7 @@ public readonly policy: string; The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -898,7 +898,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/pkiSecretBackendCert.csharp.md b/docs/pkiSecretBackendCert.csharp.md index ca76ecd4..8bd77ce2 100644 --- a/docs/pkiSecretBackendCert.csharp.md +++ b/docs/pkiSecretBackendCert.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers @@ -572,7 +572,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1305,7 +1305,7 @@ new PkiSecretBackendCertConfig { | AutoRenew | object | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | ExcludeCnFromSans | object | Flag to exclude CN from SANs. | | Format | string | The format of data. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | IpSans | string[] | List of alternative IPs. | | IssuerRef | string | Specifies the default issuer of this request. | | MinSecondsRemaining | double | Generate a new certificate when the expiration is within this number of seconds. | @@ -1399,7 +1399,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1413,7 +1413,7 @@ public string CommonName { get; set; } CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1427,7 +1427,7 @@ public string Name { get; set; } Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1441,7 +1441,7 @@ public string[] AltNames { get; set; } List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1455,7 +1455,7 @@ public object AutoRenew { get; set; } If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1469,7 +1469,7 @@ public object ExcludeCnFromSans { get; set; } Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1483,7 +1483,7 @@ public string Format { get; set; } The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1495,7 +1495,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1512,7 +1512,7 @@ public string[] IpSans { get; set; } List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1526,7 +1526,7 @@ public string IssuerRef { get; set; } Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1540,7 +1540,7 @@ public double MinSecondsRemaining { get; set; } Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1554,7 +1554,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1568,7 +1568,7 @@ public string[] OtherSans { get; set; } List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1582,7 +1582,7 @@ public string PrivateKeyFormat { get; set; } The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1596,7 +1596,7 @@ public object Revoke { get; set; } Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1610,7 +1610,7 @@ public string Ttl { get; set; } Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1624,7 +1624,7 @@ public string[] UriSans { get; set; } List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1638,7 +1638,7 @@ public string[] UserIds { get; set; } List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendCert.go.md b/docs/pkiSecretBackendCert.go.md index f543ff93..8217be74 100644 --- a/docs/pkiSecretBackendCert.go.md +++ b/docs/pkiSecretBackendCert.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcert" pkisecretbackendcert.NewPkiSecretBackendCert(scope Construct, id *string, config PkiSecretBackendCertConfig) PkiSecretBackendCert ``` @@ -483,7 +483,7 @@ func ResetUserIds() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcert" pkisecretbackendcert.PkiSecretBackendCert_IsConstruct(x interface{}) *bool ``` @@ -515,7 +515,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcert" pkisecretbackendcert.PkiSecretBackendCert_IsTerraformElement(x interface{}) *bool ``` @@ -529,7 +529,7 @@ pkisecretbackendcert.PkiSecretBackendCert_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcert" pkisecretbackendcert.PkiSecretBackendCert_IsTerraformResource(x interface{}) *bool ``` @@ -543,7 +543,7 @@ pkisecretbackendcert.PkiSecretBackendCert_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcert" pkisecretbackendcert.PkiSecretBackendCert_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -572,7 +572,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1256,7 +1256,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcert" &pkisecretbackendcert.PkiSecretBackendCertConfig { Connection: interface{}, @@ -1305,7 +1305,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcert" | AutoRenew | interface{} | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | ExcludeCnFromSans | interface{} | Flag to exclude CN from SANs. | | Format | *string | The format of data. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | IpSans | *[]*string | List of alternative IPs. | | IssuerRef | *string | Specifies the default issuer of this request. | | MinSecondsRemaining | *f64 | Generate a new certificate when the expiration is within this number of seconds. | @@ -1399,7 +1399,7 @@ Backend *string The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1413,7 +1413,7 @@ CommonName *string CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1427,7 +1427,7 @@ Name *string Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1441,7 +1441,7 @@ AltNames *[]*string List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1455,7 +1455,7 @@ AutoRenew interface{} If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1469,7 +1469,7 @@ ExcludeCnFromSans interface{} Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1483,7 +1483,7 @@ Format *string The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1495,7 +1495,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1512,7 +1512,7 @@ IpSans *[]*string List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1526,7 +1526,7 @@ IssuerRef *string Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1540,7 +1540,7 @@ MinSecondsRemaining *f64 Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1554,7 +1554,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1568,7 +1568,7 @@ OtherSans *[]*string List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1582,7 +1582,7 @@ PrivateKeyFormat *string The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1596,7 +1596,7 @@ Revoke interface{} Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1610,7 +1610,7 @@ Ttl *string Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1624,7 +1624,7 @@ UriSans *[]*string List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1638,7 +1638,7 @@ UserIds *[]*string List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendCert.java.md b/docs/pkiSecretBackendCert.java.md index edb0bb35..03c42b56 100644 --- a/docs/pkiSecretBackendCert.java.md +++ b/docs/pkiSecretBackendCert.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers @@ -65,7 +65,7 @@ PkiSecretBackendCert.Builder.create(Construct scope, java.lang.String id) | autoRenew | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | minSecondsRemaining | java.lang.Number | Generate a new certificate when the expiration is within this number of seconds. | @@ -145,7 +145,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -226,7 +226,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- @@ -848,7 +848,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1588,7 +1588,7 @@ PkiSecretBackendCertConfig.builder() | autoRenew | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | minSecondsRemaining | java.lang.Number | Generate a new certificate when the expiration is within this number of seconds. | @@ -1682,7 +1682,7 @@ public java.lang.String getBackend(); The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1696,7 +1696,7 @@ public java.lang.String getCommonName(); CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1710,7 +1710,7 @@ public java.lang.String getName(); Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1724,7 +1724,7 @@ public java.util.List getAltNames(); List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1738,7 +1738,7 @@ public java.lang.Object getAutoRenew(); If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1752,7 +1752,7 @@ public java.lang.Object getExcludeCnFromSans(); Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1766,7 +1766,7 @@ public java.lang.String getFormat(); The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1778,7 +1778,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1795,7 +1795,7 @@ public java.util.List getIpSans(); List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1809,7 +1809,7 @@ public java.lang.String getIssuerRef(); Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1823,7 +1823,7 @@ public java.lang.Number getMinSecondsRemaining(); Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1837,7 +1837,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1851,7 +1851,7 @@ public java.util.List getOtherSans(); List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1865,7 +1865,7 @@ public java.lang.String getPrivateKeyFormat(); The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1879,7 +1879,7 @@ public java.lang.Object getRevoke(); Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1893,7 +1893,7 @@ public java.lang.String getTtl(); Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1907,7 +1907,7 @@ public java.util.List getUriSans(); List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1921,7 +1921,7 @@ public java.util.List getUserIds(); List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendCert.python.md b/docs/pkiSecretBackendCert.python.md index b7c5f1e4..18ba2680 100644 --- a/docs/pkiSecretBackendCert.python.md +++ b/docs/pkiSecretBackendCert.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers @@ -60,7 +60,7 @@ pkiSecretBackendCert.PkiSecretBackendCert( | auto_renew | typing.Union[bool, cdktf.IResolvable] | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_ref | str | Specifies the default issuer of this request. | | min_seconds_remaining | typing.Union[int, float] | Generate a new certificate when the expiration is within this number of seconds. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -221,7 +221,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- @@ -889,7 +889,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1622,7 +1622,7 @@ pkiSecretBackendCert.PkiSecretBackendCertConfig( | auto_renew | typing.Union[bool, cdktf.IResolvable] | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_ref | str | Specifies the default issuer of this request. | | min_seconds_remaining | typing.Union[int, float] | Generate a new certificate when the expiration is within this number of seconds. | @@ -1716,7 +1716,7 @@ backend: str The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1730,7 +1730,7 @@ common_name: str CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1744,7 +1744,7 @@ name: str Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1758,7 +1758,7 @@ alt_names: typing.List[str] List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1772,7 +1772,7 @@ auto_renew: typing.Union[bool, IResolvable] If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1786,7 +1786,7 @@ exclude_cn_from_sans: typing.Union[bool, IResolvable] Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1800,7 +1800,7 @@ format: str The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1812,7 +1812,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1829,7 +1829,7 @@ ip_sans: typing.List[str] List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1843,7 +1843,7 @@ issuer_ref: str Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1857,7 +1857,7 @@ min_seconds_remaining: typing.Union[int, float] Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1871,7 +1871,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1885,7 +1885,7 @@ other_sans: typing.List[str] List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1899,7 +1899,7 @@ private_key_format: str The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1913,7 +1913,7 @@ revoke: typing.Union[bool, IResolvable] Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1927,7 +1927,7 @@ ttl: str Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1941,7 +1941,7 @@ uri_sans: typing.List[str] List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1955,7 +1955,7 @@ user_ids: typing.List[str] List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendCert.typescript.md b/docs/pkiSecretBackendCert.typescript.md index 16bbcd65..2c2cf671 100644 --- a/docs/pkiSecretBackendCert.typescript.md +++ b/docs/pkiSecretBackendCert.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers @@ -572,7 +572,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1279,7 +1279,7 @@ const pkiSecretBackendCertConfig: pkiSecretBackendCert.PkiSecretBackendCertConfi | autoRenew | boolean \| cdktf.IResolvable | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | excludeCnFromSans | boolean \| cdktf.IResolvable | Flag to exclude CN from SANs. | | format | string | The format of data. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ipSans | string[] | List of alternative IPs. | | issuerRef | string | Specifies the default issuer of this request. | | minSecondsRemaining | number | Generate a new certificate when the expiration is within this number of seconds. | @@ -1373,7 +1373,7 @@ public readonly backend: string; The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1387,7 +1387,7 @@ public readonly commonName: string; CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1401,7 +1401,7 @@ public readonly name: string; Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1415,7 +1415,7 @@ public readonly altNames: string[]; List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1429,7 +1429,7 @@ public readonly autoRenew: boolean | IResolvable; If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1443,7 +1443,7 @@ public readonly excludeCnFromSans: boolean | IResolvable; Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1457,7 +1457,7 @@ public readonly format: string; The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1469,7 +1469,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1486,7 +1486,7 @@ public readonly ipSans: string[]; List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1500,7 +1500,7 @@ public readonly issuerRef: string; Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1514,7 +1514,7 @@ public readonly minSecondsRemaining: number; Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1528,7 +1528,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1542,7 +1542,7 @@ public readonly otherSans: string[]; List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1556,7 +1556,7 @@ public readonly privateKeyFormat: string; The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1570,7 +1570,7 @@ public readonly revoke: boolean | IResolvable; Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1584,7 +1584,7 @@ public readonly ttl: string; Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1598,7 +1598,7 @@ public readonly uriSans: string[]; List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1612,7 +1612,7 @@ public readonly userIds: string[]; List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendConfigCa.csharp.md b/docs/pkiSecretBackendConfigCa.csharp.md index 9ef8498f..f9610acc 100644 --- a/docs/pkiSecretBackendConfigCa.csharp.md +++ b/docs/pkiSecretBackendConfigCa.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ new PkiSecretBackendConfigCaConfig { | Provisioners | object[] | *No description.* | | Backend | string | The PKI secret backend the resource belongs to. | | PemBundle | string | The key and certificate PEM bundle. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -898,7 +898,7 @@ public string PemBundle { get; set; } The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -910,7 +910,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCa.go.md b/docs/pkiSecretBackendConfigCa.go.md index 5e7faa79..11f7eb99 100644 --- a/docs/pkiSecretBackendConfigCa.go.md +++ b/docs/pkiSecretBackendConfigCa.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigca" pkisecretbackendconfigca.NewPkiSecretBackendConfigCa(scope Construct, id *string, config PkiSecretBackendConfigCaConfig) PkiSecretBackendConfigCa ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigca" pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigca" pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsTerraformElement(x interface ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigca" pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ pkisecretbackendconfigca.PkiSecretBackendConfigCa_IsTerraformResource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigca" pkisecretbackendconfigca.PkiSecretBackendConfigCa_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigca" &pkisecretbackendconfigca.PkiSecretBackendConfigCaConfig { Connection: interface{}, @@ -799,7 +799,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfi | Provisioners | *[]interface{} | *No description.* | | Backend | *string | The PKI secret backend the resource belongs to. | | PemBundle | *string | The key and certificate PEM bundle. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ Backend *string The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -898,7 +898,7 @@ PemBundle *string The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -910,7 +910,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCa.java.md b/docs/pkiSecretBackendConfigCa.java.md index 73463e0a..3971c79a 100644 --- a/docs/pkiSecretBackendConfigCa.java.md +++ b/docs/pkiSecretBackendConfigCa.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers @@ -43,7 +43,7 @@ PkiSecretBackendConfigCa.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The PKI secret backend the resource belongs to. | | pemBundle | java.lang.String | The key and certificate PEM bundle. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ PkiSecretBackendConfigCaConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The PKI secret backend the resource belongs to. | | pemBundle | java.lang.String | The key and certificate PEM bundle. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ public java.lang.String getBackend(); The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -1007,7 +1007,7 @@ public java.lang.String getPemBundle(); The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -1019,7 +1019,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCa.python.md b/docs/pkiSecretBackendConfigCa.python.md index e0da0ee0..84bd59ab 100644 --- a/docs/pkiSecretBackendConfigCa.python.md +++ b/docs/pkiSecretBackendConfigCa.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers @@ -41,7 +41,7 @@ pkiSecretBackendConfigCa.PkiSecretBackendConfigCa( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The PKI secret backend the resource belongs to. | | pem_bundle | str | The key and certificate PEM bundle. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -948,7 +948,7 @@ pkiSecretBackendConfigCa.PkiSecretBackendConfigCaConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The PKI secret backend the resource belongs to. | | pem_bundle | str | The key and certificate PEM bundle. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1033,7 +1033,7 @@ backend: str The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -1047,7 +1047,7 @@ pem_bundle: str The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -1059,7 +1059,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCa.typescript.md b/docs/pkiSecretBackendConfigCa.typescript.md index d84be018..32e1244a 100644 --- a/docs/pkiSecretBackendConfigCa.typescript.md +++ b/docs/pkiSecretBackendConfigCa.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ const pkiSecretBackendConfigCaConfig: pkiSecretBackendConfigCa.PkiSecretBackendC | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | The PKI secret backend the resource belongs to. | | pemBundle | string | The key and certificate PEM bundle. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ public readonly backend: string; The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -886,7 +886,7 @@ public readonly pemBundle: string; The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -898,7 +898,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCluster.csharp.md b/docs/pkiSecretBackendConfigCluster.csharp.md new file mode 100644 index 00000000..c6338307 --- /dev/null +++ b/docs/pkiSecretBackendConfigCluster.csharp.md @@ -0,0 +1,987 @@ +# `pkiSecretBackendConfigCluster` Submodule + +## Constructs + +### PkiSecretBackendConfigCluster + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. + +#### Initializers + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +new PkiSecretBackendConfigCluster(Construct Scope, string Id, PkiSecretBackendConfigClusterConfig Config); +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Scope | Constructs.Construct | The scope in which to define this construct. | +| Id | string | The scoped construct ID. | +| Config | PkiSecretBackendConfigClusterConfig | *No description.* | + +--- + +##### `Scope`Required + +- *Type:* Constructs.Construct + +The scope in which to define this construct. + +--- + +##### `Id`Required + +- *Type:* string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `Config`Required + +- *Type:* PkiSecretBackendConfigClusterConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| ToString | Returns a string representation of this construct. | +| AddOverride | *No description.* | +| OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | +| ToMetadata | *No description.* | +| ToTerraform | Adds this resource to the terraform JSON output. | +| AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| GetAnyMapAttribute | *No description.* | +| GetBooleanAttribute | *No description.* | +| GetBooleanMapAttribute | *No description.* | +| GetListAttribute | *No description.* | +| GetNumberAttribute | *No description.* | +| GetNumberListAttribute | *No description.* | +| GetNumberMapAttribute | *No description.* | +| GetStringAttribute | *No description.* | +| GetStringMapAttribute | *No description.* | +| HasResourceMove | *No description.* | +| ImportFrom | *No description.* | +| InterpolationForAttribute | *No description.* | +| MoveFromId | Move the resource corresponding to "id" to this resource. | +| MoveTo | Moves this resource to the target resource given by moveTarget. | +| MoveToId | Moves this resource to the resource corresponding to "id". | +| ResetAiaPath | *No description.* | +| ResetId | *No description.* | +| ResetNamespace | *No description.* | +| ResetPath | *No description.* | + +--- + +##### `ToString` + +```csharp +private string ToString() +``` + +Returns a string representation of this construct. + +##### `AddOverride` + +```csharp +private void AddOverride(string Path, object Value) +``` + +###### `Path`Required + +- *Type:* string + +--- + +###### `Value`Required + +- *Type:* object + +--- + +##### `OverrideLogicalId` + +```csharp +private void OverrideLogicalId(string NewLogicalId) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `NewLogicalId`Required + +- *Type:* string + +The new logical ID to use for this stack element. + +--- + +##### `ResetOverrideLogicalId` + +```csharp +private void ResetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +##### `ToMetadata` + +```csharp +private object ToMetadata() +``` + +##### `ToTerraform` + +```csharp +private object ToTerraform() +``` + +Adds this resource to the terraform JSON output. + +##### `AddMoveTarget` + +```csharp +private void AddMoveTarget(string MoveTarget) +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `MoveTarget`Required + +- *Type:* string + +The string move target that will correspond to this resource. + +--- + +##### `GetAnyMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetAnyMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetBooleanAttribute` + +```csharp +private IResolvable GetBooleanAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetBooleanMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetBooleanMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetListAttribute` + +```csharp +private string[] GetListAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberAttribute` + +```csharp +private double GetNumberAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberListAttribute` + +```csharp +private double[] GetNumberListAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetNumberMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetStringAttribute` + +```csharp +private string GetStringAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetStringMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetStringMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `HasResourceMove` + +```csharp +private object HasResourceMove() +``` + +##### `ImportFrom` + +```csharp +private void ImportFrom(string Id, TerraformProvider Provider = null) +``` + +###### `Id`Required + +- *Type:* string + +--- + +###### `Provider`Optional + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `InterpolationForAttribute` + +```csharp +private IResolvable InterpolationForAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `MoveFromId` + +```csharp +private void MoveFromId(string Id) +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `Id`Required + +- *Type:* string + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `MoveTo` + +```csharp +private void MoveTo(string MoveTarget, object Index = null) +``` + +Moves this resource to the target resource given by moveTarget. + +###### `MoveTarget`Required + +- *Type:* string + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `Index`Optional + +- *Type:* object + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `MoveToId` + +```csharp +private void MoveToId(string Id) +``` + +Moves this resource to the resource corresponding to "id". + +###### `Id`Required + +- *Type:* string + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `ResetAiaPath` + +```csharp +private void ResetAiaPath() +``` + +##### `ResetId` + +```csharp +private void ResetId() +``` + +##### `ResetNamespace` + +```csharp +private void ResetNamespace() +``` + +##### `ResetPath` + +```csharp +private void ResetPath() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| IsConstruct | Checks if `x` is a construct. | +| IsTerraformElement | *No description.* | +| IsTerraformResource | *No description.* | +| GenerateConfigForImport | Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". | + +--- + +##### `IsConstruct` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +PkiSecretBackendConfigCluster.IsConstruct(object X); +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `X`Required + +- *Type:* object + +Any object. + +--- + +##### `IsTerraformElement` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +PkiSecretBackendConfigCluster.IsTerraformElement(object X); +``` + +###### `X`Required + +- *Type:* object + +--- + +##### `IsTerraformResource` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +PkiSecretBackendConfigCluster.IsTerraformResource(object X); +``` + +###### `X`Required + +- *Type:* object + +--- + +##### `GenerateConfigForImport` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +PkiSecretBackendConfigCluster.GenerateConfigForImport(Construct Scope, string ImportToId, string ImportFromId, TerraformProvider Provider = null); +``` + +Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". + +###### `Scope`Required + +- *Type:* Constructs.Construct + +The scope in which to define this construct. + +--- + +###### `ImportToId`Required + +- *Type:* string + +The construct id used in the generated config for the PkiSecretBackendConfigCluster to import. + +--- + +###### `ImportFromId`Required + +- *Type:* string + +The id of the existing PkiSecretBackendConfigCluster that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use + +--- + +###### `Provider`Optional + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +? Optional instance of the provider where the PkiSecretBackendConfigCluster to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Node | Constructs.Node | The tree node. | +| CdktfStack | HashiCorp.Cdktf.TerraformStack | *No description.* | +| Fqn | string | *No description.* | +| FriendlyUniqueId | string | *No description.* | +| TerraformMetaArguments | System.Collections.Generic.IDictionary | *No description.* | +| TerraformResourceType | string | *No description.* | +| TerraformGeneratorMetadata | HashiCorp.Cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| Connection | object | *No description.* | +| Count | object | *No description.* | +| DependsOn | string[] | *No description.* | +| ForEach | HashiCorp.Cdktf.ITerraformIterator | *No description.* | +| Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | +| Provisioners | object[] | *No description.* | +| AiaPathInput | string | *No description.* | +| BackendInput | string | *No description.* | +| IdInput | string | *No description.* | +| NamespaceInput | string | *No description.* | +| PathInput | string | *No description.* | +| AiaPath | string | *No description.* | +| Backend | string | *No description.* | +| Id | string | *No description.* | +| Namespace | string | *No description.* | +| Path | string | *No description.* | + +--- + +##### `Node`Required + +```csharp +public Node Node { get; } +``` + +- *Type:* Constructs.Node + +The tree node. + +--- + +##### `CdktfStack`Required + +```csharp +public TerraformStack CdktfStack { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformStack + +--- + +##### `Fqn`Required + +```csharp +public string Fqn { get; } +``` + +- *Type:* string + +--- + +##### `FriendlyUniqueId`Required + +```csharp +public string FriendlyUniqueId { get; } +``` + +- *Type:* string + +--- + +##### `TerraformMetaArguments`Required + +```csharp +public System.Collections.Generic.IDictionary TerraformMetaArguments { get; } +``` + +- *Type:* System.Collections.Generic.IDictionary + +--- + +##### `TerraformResourceType`Required + +```csharp +public string TerraformResourceType { get; } +``` + +- *Type:* string + +--- + +##### `TerraformGeneratorMetadata`Optional + +```csharp +public TerraformProviderGeneratorMetadata TerraformGeneratorMetadata { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `Connection`Optional + +```csharp +public object Connection { get; } +``` + +- *Type:* object + +--- + +##### `Count`Optional + +```csharp +public object Count { get; } +``` + +- *Type:* object + +--- + +##### `DependsOn`Optional + +```csharp +public string[] DependsOn { get; } +``` + +- *Type:* string[] + +--- + +##### `ForEach`Optional + +```csharp +public ITerraformIterator ForEach { get; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```csharp +public TerraformResourceLifecycle Lifecycle { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```csharp +public TerraformProvider Provider { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```csharp +public object[] Provisioners { get; } +``` + +- *Type:* object[] + +--- + +##### `AiaPathInput`Optional + +```csharp +public string AiaPathInput { get; } +``` + +- *Type:* string + +--- + +##### `BackendInput`Optional + +```csharp +public string BackendInput { get; } +``` + +- *Type:* string + +--- + +##### `IdInput`Optional + +```csharp +public string IdInput { get; } +``` + +- *Type:* string + +--- + +##### `NamespaceInput`Optional + +```csharp +public string NamespaceInput { get; } +``` + +- *Type:* string + +--- + +##### `PathInput`Optional + +```csharp +public string PathInput { get; } +``` + +- *Type:* string + +--- + +##### `AiaPath`Required + +```csharp +public string AiaPath { get; } +``` + +- *Type:* string + +--- + +##### `Backend`Required + +```csharp +public string Backend { get; } +``` + +- *Type:* string + +--- + +##### `Id`Required + +```csharp +public string Id { get; } +``` + +- *Type:* string + +--- + +##### `Namespace`Required + +```csharp +public string Namespace { get; } +``` + +- *Type:* string + +--- + +##### `Path`Required + +```csharp +public string Path { get; } +``` + +- *Type:* string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| TfResourceType | string | *No description.* | + +--- + +##### `TfResourceType`Required + +```csharp +public string TfResourceType { get; } +``` + +- *Type:* string + +--- + +## Structs + +### PkiSecretBackendConfigClusterConfig + +#### Initializer + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +new PkiSecretBackendConfigClusterConfig { + object Connection = null, + object Count = null, + ITerraformDependable[] DependsOn = null, + ITerraformIterator ForEach = null, + TerraformResourceLifecycle Lifecycle = null, + TerraformProvider Provider = null, + object[] Provisioners = null, + string Backend, + string AiaPath = null, + string Id = null, + string Namespace = null, + string Path = null +}; +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Connection | object | *No description.* | +| Count | object | *No description.* | +| DependsOn | HashiCorp.Cdktf.ITerraformDependable[] | *No description.* | +| ForEach | HashiCorp.Cdktf.ITerraformIterator | *No description.* | +| Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | +| Provisioners | object[] | *No description.* | +| Backend | string | Full path where PKI backend is mounted. | +| AiaPath | string | Path to the cluster's AIA distribution point. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| Namespace | string | Target namespace. (requires Enterprise). | +| Path | string | Path to the cluster's API mount path. | + +--- + +##### `Connection`Optional + +```csharp +public object Connection { get; set; } +``` + +- *Type:* object + +--- + +##### `Count`Optional + +```csharp +public object Count { get; set; } +``` + +- *Type:* object + +--- + +##### `DependsOn`Optional + +```csharp +public ITerraformDependable[] DependsOn { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformDependable[] + +--- + +##### `ForEach`Optional + +```csharp +public ITerraformIterator ForEach { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```csharp +public TerraformResourceLifecycle Lifecycle { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```csharp +public TerraformProvider Provider { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```csharp +public object[] Provisioners { get; set; } +``` + +- *Type:* object[] + +--- + +##### `Backend`Required + +```csharp +public string Backend { get; set; } +``` + +- *Type:* string + +Full path where PKI backend is mounted. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} + +--- + +##### `AiaPath`Optional + +```csharp +public string AiaPath { get; set; } +``` + +- *Type:* string + +Path to the cluster's AIA distribution point. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} + +--- + +##### `Id`Optional + +```csharp +public string Id { get; set; } +``` + +- *Type:* string + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `Namespace`Optional + +```csharp +public string Namespace { get; set; } +``` + +- *Type:* string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} + +--- + +##### `Path`Optional + +```csharp +public string Path { get; set; } +``` + +- *Type:* string + +Path to the cluster's API mount path. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} + +--- + + + diff --git a/docs/pkiSecretBackendConfigCluster.go.md b/docs/pkiSecretBackendConfigCluster.go.md new file mode 100644 index 00000000..bfb05f91 --- /dev/null +++ b/docs/pkiSecretBackendConfigCluster.go.md @@ -0,0 +1,987 @@ +# `pkiSecretBackendConfigCluster` Submodule + +## Constructs + +### PkiSecretBackendConfigCluster + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. + +#### Initializers + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigcluster" + +pkisecretbackendconfigcluster.NewPkiSecretBackendConfigCluster(scope Construct, id *string, config PkiSecretBackendConfigClusterConfig) PkiSecretBackendConfigCluster +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | github.com/aws/constructs-go/constructs/v10.Construct | The scope in which to define this construct. | +| id | *string | The scoped construct ID. | +| config | PkiSecretBackendConfigClusterConfig | *No description.* | + +--- + +##### `scope`Required + +- *Type:* github.com/aws/constructs-go/constructs/v10.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* *string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `config`Required + +- *Type:* PkiSecretBackendConfigClusterConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| ToString | Returns a string representation of this construct. | +| AddOverride | *No description.* | +| OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | +| ToMetadata | *No description.* | +| ToTerraform | Adds this resource to the terraform JSON output. | +| AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| GetAnyMapAttribute | *No description.* | +| GetBooleanAttribute | *No description.* | +| GetBooleanMapAttribute | *No description.* | +| GetListAttribute | *No description.* | +| GetNumberAttribute | *No description.* | +| GetNumberListAttribute | *No description.* | +| GetNumberMapAttribute | *No description.* | +| GetStringAttribute | *No description.* | +| GetStringMapAttribute | *No description.* | +| HasResourceMove | *No description.* | +| ImportFrom | *No description.* | +| InterpolationForAttribute | *No description.* | +| MoveFromId | Move the resource corresponding to "id" to this resource. | +| MoveTo | Moves this resource to the target resource given by moveTarget. | +| MoveToId | Moves this resource to the resource corresponding to "id". | +| ResetAiaPath | *No description.* | +| ResetId | *No description.* | +| ResetNamespace | *No description.* | +| ResetPath | *No description.* | + +--- + +##### `ToString` + +```go +func ToString() *string +``` + +Returns a string representation of this construct. + +##### `AddOverride` + +```go +func AddOverride(path *string, value interface{}) +``` + +###### `path`Required + +- *Type:* *string + +--- + +###### `value`Required + +- *Type:* interface{} + +--- + +##### `OverrideLogicalId` + +```go +func OverrideLogicalId(newLogicalId *string) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* *string + +The new logical ID to use for this stack element. + +--- + +##### `ResetOverrideLogicalId` + +```go +func ResetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +##### `ToMetadata` + +```go +func ToMetadata() interface{} +``` + +##### `ToTerraform` + +```go +func ToTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + +##### `AddMoveTarget` + +```go +func AddMoveTarget(moveTarget *string) +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `moveTarget`Required + +- *Type:* *string + +The string move target that will correspond to this resource. + +--- + +##### `GetAnyMapAttribute` + +```go +func GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetBooleanAttribute` + +```go +func GetBooleanAttribute(terraformAttribute *string) IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetBooleanMapAttribute` + +```go +func GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetListAttribute` + +```go +func GetListAttribute(terraformAttribute *string) *[]*string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberAttribute` + +```go +func GetNumberAttribute(terraformAttribute *string) *f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberListAttribute` + +```go +func GetNumberListAttribute(terraformAttribute *string) *[]*f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberMapAttribute` + +```go +func GetNumberMapAttribute(terraformAttribute *string) *map[string]*f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetStringAttribute` + +```go +func GetStringAttribute(terraformAttribute *string) *string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetStringMapAttribute` + +```go +func GetStringMapAttribute(terraformAttribute *string) *map[string]*string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `HasResourceMove` + +```go +func HasResourceMove() interface{} +``` + +##### `ImportFrom` + +```go +func ImportFrom(id *string, provider TerraformProvider) +``` + +###### `id`Required + +- *Type:* *string + +--- + +###### `provider`Optional + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `InterpolationForAttribute` + +```go +func InterpolationForAttribute(terraformAttribute *string) IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `MoveFromId` + +```go +func MoveFromId(id *string) +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `id`Required + +- *Type:* *string + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `MoveTo` + +```go +func MoveTo(moveTarget *string, index interface{}) +``` + +Moves this resource to the target resource given by moveTarget. + +###### `moveTarget`Required + +- *Type:* *string + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `index`Optional + +- *Type:* interface{} + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `MoveToId` + +```go +func MoveToId(id *string) +``` + +Moves this resource to the resource corresponding to "id". + +###### `id`Required + +- *Type:* *string + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `ResetAiaPath` + +```go +func ResetAiaPath() +``` + +##### `ResetId` + +```go +func ResetId() +``` + +##### `ResetNamespace` + +```go +func ResetNamespace() +``` + +##### `ResetPath` + +```go +func ResetPath() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| IsConstruct | Checks if `x` is a construct. | +| IsTerraformElement | *No description.* | +| IsTerraformResource | *No description.* | +| GenerateConfigForImport | Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". | + +--- + +##### `IsConstruct` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigcluster" + +pkisecretbackendconfigcluster.PkiSecretBackendConfigCluster_IsConstruct(x interface{}) *bool +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* interface{} + +Any object. + +--- + +##### `IsTerraformElement` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigcluster" + +pkisecretbackendconfigcluster.PkiSecretBackendConfigCluster_IsTerraformElement(x interface{}) *bool +``` + +###### `x`Required + +- *Type:* interface{} + +--- + +##### `IsTerraformResource` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigcluster" + +pkisecretbackendconfigcluster.PkiSecretBackendConfigCluster_IsTerraformResource(x interface{}) *bool +``` + +###### `x`Required + +- *Type:* interface{} + +--- + +##### `GenerateConfigForImport` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigcluster" + +pkisecretbackendconfigcluster.PkiSecretBackendConfigCluster_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource +``` + +Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". + +###### `scope`Required + +- *Type:* github.com/aws/constructs-go/constructs/v10.Construct + +The scope in which to define this construct. + +--- + +###### `importToId`Required + +- *Type:* *string + +The construct id used in the generated config for the PkiSecretBackendConfigCluster to import. + +--- + +###### `importFromId`Required + +- *Type:* *string + +The id of the existing PkiSecretBackendConfigCluster that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use + +--- + +###### `provider`Optional + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +? Optional instance of the provider where the PkiSecretBackendConfigCluster to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Node | github.com/aws/constructs-go/constructs/v10.Node | The tree node. | +| CdktfStack | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack | *No description.* | +| Fqn | *string | *No description.* | +| FriendlyUniqueId | *string | *No description.* | +| TerraformMetaArguments | *map[string]interface{} | *No description.* | +| TerraformResourceType | *string | *No description.* | +| TerraformGeneratorMetadata | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| Connection | interface{} | *No description.* | +| Count | interface{} | *No description.* | +| DependsOn | *[]*string | *No description.* | +| ForEach | github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator | *No description.* | +| Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | +| Provisioners | *[]interface{} | *No description.* | +| AiaPathInput | *string | *No description.* | +| BackendInput | *string | *No description.* | +| IdInput | *string | *No description.* | +| NamespaceInput | *string | *No description.* | +| PathInput | *string | *No description.* | +| AiaPath | *string | *No description.* | +| Backend | *string | *No description.* | +| Id | *string | *No description.* | +| Namespace | *string | *No description.* | +| Path | *string | *No description.* | + +--- + +##### `Node`Required + +```go +func Node() Node +``` + +- *Type:* github.com/aws/constructs-go/constructs/v10.Node + +The tree node. + +--- + +##### `CdktfStack`Required + +```go +func CdktfStack() TerraformStack +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack + +--- + +##### `Fqn`Required + +```go +func Fqn() *string +``` + +- *Type:* *string + +--- + +##### `FriendlyUniqueId`Required + +```go +func FriendlyUniqueId() *string +``` + +- *Type:* *string + +--- + +##### `TerraformMetaArguments`Required + +```go +func TerraformMetaArguments() *map[string]interface{} +``` + +- *Type:* *map[string]interface{} + +--- + +##### `TerraformResourceType`Required + +```go +func TerraformResourceType() *string +``` + +- *Type:* *string + +--- + +##### `TerraformGeneratorMetadata`Optional + +```go +func TerraformGeneratorMetadata() TerraformProviderGeneratorMetadata +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `Connection`Optional + +```go +func Connection() interface{} +``` + +- *Type:* interface{} + +--- + +##### `Count`Optional + +```go +func Count() interface{} +``` + +- *Type:* interface{} + +--- + +##### `DependsOn`Optional + +```go +func DependsOn() *[]*string +``` + +- *Type:* *[]*string + +--- + +##### `ForEach`Optional + +```go +func ForEach() ITerraformIterator +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```go +func Lifecycle() TerraformResourceLifecycle +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```go +func Provider() TerraformProvider +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```go +func Provisioners() *[]interface{} +``` + +- *Type:* *[]interface{} + +--- + +##### `AiaPathInput`Optional + +```go +func AiaPathInput() *string +``` + +- *Type:* *string + +--- + +##### `BackendInput`Optional + +```go +func BackendInput() *string +``` + +- *Type:* *string + +--- + +##### `IdInput`Optional + +```go +func IdInput() *string +``` + +- *Type:* *string + +--- + +##### `NamespaceInput`Optional + +```go +func NamespaceInput() *string +``` + +- *Type:* *string + +--- + +##### `PathInput`Optional + +```go +func PathInput() *string +``` + +- *Type:* *string + +--- + +##### `AiaPath`Required + +```go +func AiaPath() *string +``` + +- *Type:* *string + +--- + +##### `Backend`Required + +```go +func Backend() *string +``` + +- *Type:* *string + +--- + +##### `Id`Required + +```go +func Id() *string +``` + +- *Type:* *string + +--- + +##### `Namespace`Required + +```go +func Namespace() *string +``` + +- *Type:* *string + +--- + +##### `Path`Required + +```go +func Path() *string +``` + +- *Type:* *string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| TfResourceType | *string | *No description.* | + +--- + +##### `TfResourceType`Required + +```go +func TfResourceType() *string +``` + +- *Type:* *string + +--- + +## Structs + +### PkiSecretBackendConfigClusterConfig + +#### Initializer + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigcluster" + +&pkisecretbackendconfigcluster.PkiSecretBackendConfigClusterConfig { + Connection: interface{}, + Count: interface{}, + DependsOn: *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable, + ForEach: github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator, + Lifecycle: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle, + Provider: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider, + Provisioners: *[]interface{}, + Backend: *string, + AiaPath: *string, + Id: *string, + Namespace: *string, + Path: *string, +} +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Connection | interface{} | *No description.* | +| Count | interface{} | *No description.* | +| DependsOn | *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable | *No description.* | +| ForEach | github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator | *No description.* | +| Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | +| Provisioners | *[]interface{} | *No description.* | +| Backend | *string | Full path where PKI backend is mounted. | +| AiaPath | *string | Path to the cluster's AIA distribution point. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| Namespace | *string | Target namespace. (requires Enterprise). | +| Path | *string | Path to the cluster's API mount path. | + +--- + +##### `Connection`Optional + +```go +Connection interface{} +``` + +- *Type:* interface{} + +--- + +##### `Count`Optional + +```go +Count interface{} +``` + +- *Type:* interface{} + +--- + +##### `DependsOn`Optional + +```go +DependsOn *[]ITerraformDependable +``` + +- *Type:* *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable + +--- + +##### `ForEach`Optional + +```go +ForEach ITerraformIterator +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```go +Lifecycle TerraformResourceLifecycle +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```go +Provider TerraformProvider +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```go +Provisioners *[]interface{} +``` + +- *Type:* *[]interface{} + +--- + +##### `Backend`Required + +```go +Backend *string +``` + +- *Type:* *string + +Full path where PKI backend is mounted. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} + +--- + +##### `AiaPath`Optional + +```go +AiaPath *string +``` + +- *Type:* *string + +Path to the cluster's AIA distribution point. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} + +--- + +##### `Id`Optional + +```go +Id *string +``` + +- *Type:* *string + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `Namespace`Optional + +```go +Namespace *string +``` + +- *Type:* *string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} + +--- + +##### `Path`Optional + +```go +Path *string +``` + +- *Type:* *string + +Path to the cluster's API mount path. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} + +--- + + + diff --git a/docs/pkiSecretBackendConfigCluster.java.md b/docs/pkiSecretBackendConfigCluster.java.md new file mode 100644 index 00000000..cdb7b8bc --- /dev/null +++ b/docs/pkiSecretBackendConfigCluster.java.md @@ -0,0 +1,1108 @@ +# `pkiSecretBackendConfigCluster` Submodule + +## Constructs + +### PkiSecretBackendConfigCluster + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. + +#### Initializers + +```java +import com.hashicorp.cdktf.providers.vault.pki_secret_backend_config_cluster.PkiSecretBackendConfigCluster; + +PkiSecretBackendConfigCluster.Builder.create(Construct scope, java.lang.String id) +// .connection(SSHProvisionerConnection) +// .connection(WinrmProvisionerConnection) +// .count(java.lang.Number) +// .count(TerraformCount) +// .dependsOn(java.util.List) +// .forEach(ITerraformIterator) +// .lifecycle(TerraformResourceLifecycle) +// .provider(TerraformProvider) +// .provisioners(java.util.List) + .backend(java.lang.String) +// .aiaPath(java.lang.String) +// .id(java.lang.String) +// .namespace(java.lang.String) +// .path(java.lang.String) + .build(); +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | software.constructs.Construct | The scope in which to define this construct. | +| id | java.lang.String | The scoped construct ID. | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number OR com.hashicorp.cdktf.TerraformCount | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| backend | java.lang.String | Full path where PKI backend is mounted. | +| aiaPath | java.lang.String | Path to the cluster's AIA distribution point. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| namespace | java.lang.String | Target namespace. (requires Enterprise). | +| path | java.lang.String | Path to the cluster's API mount path. | + +--- + +##### `scope`Required + +- *Type:* software.constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* java.lang.String + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `connection`Optional + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +- *Type:* java.lang.Number OR com.hashicorp.cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +- *Type:* java.util.List + +--- + +##### `backend`Required + +- *Type:* java.lang.String + +Full path where PKI backend is mounted. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} + +--- + +##### `aiaPath`Optional + +- *Type:* java.lang.String + +Path to the cluster's AIA distribution point. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} + +--- + +##### `id`Optional + +- *Type:* java.lang.String + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +- *Type:* java.lang.String + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} + +--- + +##### `path`Optional + +- *Type:* java.lang.String + +Path to the cluster's API mount path. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| toString | Returns a string representation of this construct. | +| addOverride | *No description.* | +| overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | +| toMetadata | *No description.* | +| toTerraform | Adds this resource to the terraform JSON output. | +| addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| getAnyMapAttribute | *No description.* | +| getBooleanAttribute | *No description.* | +| getBooleanMapAttribute | *No description.* | +| getListAttribute | *No description.* | +| getNumberAttribute | *No description.* | +| getNumberListAttribute | *No description.* | +| getNumberMapAttribute | *No description.* | +| getStringAttribute | *No description.* | +| getStringMapAttribute | *No description.* | +| hasResourceMove | *No description.* | +| importFrom | *No description.* | +| interpolationForAttribute | *No description.* | +| moveFromId | Move the resource corresponding to "id" to this resource. | +| moveTo | Moves this resource to the target resource given by moveTarget. | +| moveToId | Moves this resource to the resource corresponding to "id". | +| resetAiaPath | *No description.* | +| resetId | *No description.* | +| resetNamespace | *No description.* | +| resetPath | *No description.* | + +--- + +##### `toString` + +```java +public java.lang.String toString() +``` + +Returns a string representation of this construct. + +##### `addOverride` + +```java +public void addOverride(java.lang.String path, java.lang.Object value) +``` + +###### `path`Required + +- *Type:* java.lang.String + +--- + +###### `value`Required + +- *Type:* java.lang.Object + +--- + +##### `overrideLogicalId` + +```java +public void overrideLogicalId(java.lang.String newLogicalId) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* java.lang.String + +The new logical ID to use for this stack element. + +--- + +##### `resetOverrideLogicalId` + +```java +public void resetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +##### `toMetadata` + +```java +public java.lang.Object toMetadata() +``` + +##### `toTerraform` + +```java +public java.lang.Object toTerraform() +``` + +Adds this resource to the terraform JSON output. + +##### `addMoveTarget` + +```java +public void addMoveTarget(java.lang.String moveTarget) +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `moveTarget`Required + +- *Type:* java.lang.String + +The string move target that will correspond to this resource. + +--- + +##### `getAnyMapAttribute` + +```java +public java.util.Map getAnyMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getBooleanAttribute` + +```java +public IResolvable getBooleanAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getBooleanMapAttribute` + +```java +public java.util.Map getBooleanMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getListAttribute` + +```java +public java.util.List getListAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberAttribute` + +```java +public java.lang.Number getNumberAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberListAttribute` + +```java +public java.util.List getNumberListAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberMapAttribute` + +```java +public java.util.Map getNumberMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getStringAttribute` + +```java +public java.lang.String getStringAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getStringMapAttribute` + +```java +public java.util.Map getStringMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `hasResourceMove` + +```java +public TerraformResourceMoveByTarget OR TerraformResourceMoveById hasResourceMove() +``` + +##### `importFrom` + +```java +public void importFrom(java.lang.String id) +public void importFrom(java.lang.String id, TerraformProvider provider) +``` + +###### `id`Required + +- *Type:* java.lang.String + +--- + +###### `provider`Optional + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `interpolationForAttribute` + +```java +public IResolvable interpolationForAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `moveFromId` + +```java +public void moveFromId(java.lang.String id) +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `id`Required + +- *Type:* java.lang.String + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `moveTo` + +```java +public void moveTo(java.lang.String moveTarget) +public void moveTo(java.lang.String moveTarget, java.lang.String OR java.lang.Number index) +``` + +Moves this resource to the target resource given by moveTarget. + +###### `moveTarget`Required + +- *Type:* java.lang.String + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `index`Optional + +- *Type:* java.lang.String OR java.lang.Number + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `moveToId` + +```java +public void moveToId(java.lang.String id) +``` + +Moves this resource to the resource corresponding to "id". + +###### `id`Required + +- *Type:* java.lang.String + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `resetAiaPath` + +```java +public void resetAiaPath() +``` + +##### `resetId` + +```java +public void resetId() +``` + +##### `resetNamespace` + +```java +public void resetNamespace() +``` + +##### `resetPath` + +```java +public void resetPath() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| isConstruct | Checks if `x` is a construct. | +| isTerraformElement | *No description.* | +| isTerraformResource | *No description.* | +| generateConfigForImport | Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". | + +--- + +##### `isConstruct` + +```java +import com.hashicorp.cdktf.providers.vault.pki_secret_backend_config_cluster.PkiSecretBackendConfigCluster; + +PkiSecretBackendConfigCluster.isConstruct(java.lang.Object x) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* java.lang.Object + +Any object. + +--- + +##### `isTerraformElement` + +```java +import com.hashicorp.cdktf.providers.vault.pki_secret_backend_config_cluster.PkiSecretBackendConfigCluster; + +PkiSecretBackendConfigCluster.isTerraformElement(java.lang.Object x) +``` + +###### `x`Required + +- *Type:* java.lang.Object + +--- + +##### `isTerraformResource` + +```java +import com.hashicorp.cdktf.providers.vault.pki_secret_backend_config_cluster.PkiSecretBackendConfigCluster; + +PkiSecretBackendConfigCluster.isTerraformResource(java.lang.Object x) +``` + +###### `x`Required + +- *Type:* java.lang.Object + +--- + +##### `generateConfigForImport` + +```java +import com.hashicorp.cdktf.providers.vault.pki_secret_backend_config_cluster.PkiSecretBackendConfigCluster; + +PkiSecretBackendConfigCluster.generateConfigForImport(Construct scope, java.lang.String importToId, java.lang.String importFromId),PkiSecretBackendConfigCluster.generateConfigForImport(Construct scope, java.lang.String importToId, java.lang.String importFromId, TerraformProvider provider) +``` + +Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". + +###### `scope`Required + +- *Type:* software.constructs.Construct + +The scope in which to define this construct. + +--- + +###### `importToId`Required + +- *Type:* java.lang.String + +The construct id used in the generated config for the PkiSecretBackendConfigCluster to import. + +--- + +###### `importFromId`Required + +- *Type:* java.lang.String + +The id of the existing PkiSecretBackendConfigCluster that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use + +--- + +###### `provider`Optional + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +? Optional instance of the provider where the PkiSecretBackendConfigCluster to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | software.constructs.Node | The tree node. | +| cdktfStack | com.hashicorp.cdktf.TerraformStack | *No description.* | +| fqn | java.lang.String | *No description.* | +| friendlyUniqueId | java.lang.String | *No description.* | +| terraformMetaArguments | java.util.Map | *No description.* | +| terraformResourceType | java.lang.String | *No description.* | +| terraformGeneratorMetadata | com.hashicorp.cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number OR com.hashicorp.cdktf.TerraformCount | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| aiaPathInput | java.lang.String | *No description.* | +| backendInput | java.lang.String | *No description.* | +| idInput | java.lang.String | *No description.* | +| namespaceInput | java.lang.String | *No description.* | +| pathInput | java.lang.String | *No description.* | +| aiaPath | java.lang.String | *No description.* | +| backend | java.lang.String | *No description.* | +| id | java.lang.String | *No description.* | +| namespace | java.lang.String | *No description.* | +| path | java.lang.String | *No description.* | + +--- + +##### `node`Required + +```java +public Node getNode(); +``` + +- *Type:* software.constructs.Node + +The tree node. + +--- + +##### `cdktfStack`Required + +```java +public TerraformStack getCdktfStack(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformStack + +--- + +##### `fqn`Required + +```java +public java.lang.String getFqn(); +``` + +- *Type:* java.lang.String + +--- + +##### `friendlyUniqueId`Required + +```java +public java.lang.String getFriendlyUniqueId(); +``` + +- *Type:* java.lang.String + +--- + +##### `terraformMetaArguments`Required + +```java +public java.util.Map getTerraformMetaArguments(); +``` + +- *Type:* java.util.Map + +--- + +##### `terraformResourceType`Required + +```java +public java.lang.String getTerraformResourceType(); +``` + +- *Type:* java.lang.String + +--- + +##### `terraformGeneratorMetadata`Optional + +```java +public TerraformProviderGeneratorMetadata getTerraformGeneratorMetadata(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```java +public java.lang.Object getConnection(); +``` + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```java +public java.lang.Object getCount(); +``` + +- *Type:* java.lang.Number OR com.hashicorp.cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +```java +public java.util.List getDependsOn(); +``` + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +```java +public ITerraformIterator getForEach(); +``` + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```java +public TerraformResourceLifecycle getLifecycle(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```java +public TerraformProvider getProvider(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```java +public java.lang.Object getProvisioners(); +``` + +- *Type:* java.util.List + +--- + +##### `aiaPathInput`Optional + +```java +public java.lang.String getAiaPathInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `backendInput`Optional + +```java +public java.lang.String getBackendInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `idInput`Optional + +```java +public java.lang.String getIdInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `namespaceInput`Optional + +```java +public java.lang.String getNamespaceInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `pathInput`Optional + +```java +public java.lang.String getPathInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `aiaPath`Required + +```java +public java.lang.String getAiaPath(); +``` + +- *Type:* java.lang.String + +--- + +##### `backend`Required + +```java +public java.lang.String getBackend(); +``` + +- *Type:* java.lang.String + +--- + +##### `id`Required + +```java +public java.lang.String getId(); +``` + +- *Type:* java.lang.String + +--- + +##### `namespace`Required + +```java +public java.lang.String getNamespace(); +``` + +- *Type:* java.lang.String + +--- + +##### `path`Required + +```java +public java.lang.String getPath(); +``` + +- *Type:* java.lang.String + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | java.lang.String | *No description.* | + +--- + +##### `tfResourceType`Required + +```java +public java.lang.String getTfResourceType(); +``` + +- *Type:* java.lang.String + +--- + +## Structs + +### PkiSecretBackendConfigClusterConfig + +#### Initializer + +```java +import com.hashicorp.cdktf.providers.vault.pki_secret_backend_config_cluster.PkiSecretBackendConfigClusterConfig; + +PkiSecretBackendConfigClusterConfig.builder() +// .connection(SSHProvisionerConnection) +// .connection(WinrmProvisionerConnection) +// .count(java.lang.Number) +// .count(TerraformCount) +// .dependsOn(java.util.List) +// .forEach(ITerraformIterator) +// .lifecycle(TerraformResourceLifecycle) +// .provider(TerraformProvider) +// .provisioners(java.util.List) + .backend(java.lang.String) +// .aiaPath(java.lang.String) +// .id(java.lang.String) +// .namespace(java.lang.String) +// .path(java.lang.String) + .build(); +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number OR com.hashicorp.cdktf.TerraformCount | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| backend | java.lang.String | Full path where PKI backend is mounted. | +| aiaPath | java.lang.String | Path to the cluster's AIA distribution point. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| namespace | java.lang.String | Target namespace. (requires Enterprise). | +| path | java.lang.String | Path to the cluster's API mount path. | + +--- + +##### `connection`Optional + +```java +public java.lang.Object getConnection(); +``` + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```java +public java.lang.Object getCount(); +``` + +- *Type:* java.lang.Number OR com.hashicorp.cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +```java +public java.util.List getDependsOn(); +``` + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +```java +public ITerraformIterator getForEach(); +``` + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```java +public TerraformResourceLifecycle getLifecycle(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```java +public TerraformProvider getProvider(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```java +public java.lang.Object getProvisioners(); +``` + +- *Type:* java.util.List + +--- + +##### `backend`Required + +```java +public java.lang.String getBackend(); +``` + +- *Type:* java.lang.String + +Full path where PKI backend is mounted. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} + +--- + +##### `aiaPath`Optional + +```java +public java.lang.String getAiaPath(); +``` + +- *Type:* java.lang.String + +Path to the cluster's AIA distribution point. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} + +--- + +##### `id`Optional + +```java +public java.lang.String getId(); +``` + +- *Type:* java.lang.String + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```java +public java.lang.String getNamespace(); +``` + +- *Type:* java.lang.String + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} + +--- + +##### `path`Optional + +```java +public java.lang.String getPath(); +``` + +- *Type:* java.lang.String + +Path to the cluster's API mount path. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} + +--- + + + diff --git a/docs/pkiSecretBackendConfigCluster.python.md b/docs/pkiSecretBackendConfigCluster.python.md new file mode 100644 index 00000000..5c203955 --- /dev/null +++ b/docs/pkiSecretBackendConfigCluster.python.md @@ -0,0 +1,1148 @@ +# `pkiSecretBackendConfigCluster` Submodule + +## Constructs + +### PkiSecretBackendConfigCluster + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. + +#### Initializers + +```python +from cdktf_cdktf_provider_vault import pki_secret_backend_config_cluster + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster( + scope: Construct, + id: str, + connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None, + count: typing.Union[typing.Union[int, float], TerraformCount] = None, + depends_on: typing.List[ITerraformDependable] = None, + for_each: ITerraformIterator = None, + lifecycle: TerraformResourceLifecycle = None, + provider: TerraformProvider = None, + provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, + backend: str, + aia_path: str = None, + id: str = None, + namespace: str = None, + path: str = None +) +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | constructs.Construct | The scope in which to define this construct. | +| id | str | The scoped construct ID. | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[typing.Union[int, float], cdktf.TerraformCount] | *No description.* | +| depends_on | typing.List[cdktf.ITerraformDependable] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| backend | str | Full path where PKI backend is mounted. | +| aia_path | str | Path to the cluster's AIA distribution point. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| namespace | str | Target namespace. (requires Enterprise). | +| path | str | Path to the cluster's API mount path. | + +--- + +##### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* str + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `connection`Optional + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +- *Type:* typing.Union[typing.Union[int, float], cdktf.TerraformCount] + +--- + +##### `depends_on`Optional + +- *Type:* typing.List[cdktf.ITerraformDependable] + +--- + +##### `for_each`Optional + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `backend`Required + +- *Type:* str + +Full path where PKI backend is mounted. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} + +--- + +##### `aia_path`Optional + +- *Type:* str + +Path to the cluster's AIA distribution point. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} + +--- + +##### `id`Optional + +- *Type:* str + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +- *Type:* str + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} + +--- + +##### `path`Optional + +- *Type:* str + +Path to the cluster's API mount path. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| to_string | Returns a string representation of this construct. | +| add_override | *No description.* | +| override_logical_id | Overrides the auto-generated logical ID with a specific ID. | +| reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | +| to_metadata | *No description.* | +| to_terraform | Adds this resource to the terraform JSON output. | +| add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| get_any_map_attribute | *No description.* | +| get_boolean_attribute | *No description.* | +| get_boolean_map_attribute | *No description.* | +| get_list_attribute | *No description.* | +| get_number_attribute | *No description.* | +| get_number_list_attribute | *No description.* | +| get_number_map_attribute | *No description.* | +| get_string_attribute | *No description.* | +| get_string_map_attribute | *No description.* | +| has_resource_move | *No description.* | +| import_from | *No description.* | +| interpolation_for_attribute | *No description.* | +| move_from_id | Move the resource corresponding to "id" to this resource. | +| move_to | Moves this resource to the target resource given by moveTarget. | +| move_to_id | Moves this resource to the resource corresponding to "id". | +| reset_aia_path | *No description.* | +| reset_id | *No description.* | +| reset_namespace | *No description.* | +| reset_path | *No description.* | + +--- + +##### `to_string` + +```python +def to_string() -> str +``` + +Returns a string representation of this construct. + +##### `add_override` + +```python +def add_override( + path: str, + value: typing.Any +) -> None +``` + +###### `path`Required + +- *Type:* str + +--- + +###### `value`Required + +- *Type:* typing.Any + +--- + +##### `override_logical_id` + +```python +def override_logical_id( + new_logical_id: str +) -> None +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `new_logical_id`Required + +- *Type:* str + +The new logical ID to use for this stack element. + +--- + +##### `reset_override_logical_id` + +```python +def reset_override_logical_id() -> None +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +##### `to_metadata` + +```python +def to_metadata() -> typing.Any +``` + +##### `to_terraform` + +```python +def to_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + +##### `add_move_target` + +```python +def add_move_target( + move_target: str +) -> None +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `move_target`Required + +- *Type:* str + +The string move target that will correspond to this resource. + +--- + +##### `get_any_map_attribute` + +```python +def get_any_map_attribute( + terraform_attribute: str +) -> typing.Mapping[typing.Any] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_boolean_attribute` + +```python +def get_boolean_attribute( + terraform_attribute: str +) -> IResolvable +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_boolean_map_attribute` + +```python +def get_boolean_map_attribute( + terraform_attribute: str +) -> typing.Mapping[bool] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_list_attribute` + +```python +def get_list_attribute( + terraform_attribute: str +) -> typing.List[str] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_attribute` + +```python +def get_number_attribute( + terraform_attribute: str +) -> typing.Union[int, float] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_list_attribute` + +```python +def get_number_list_attribute( + terraform_attribute: str +) -> typing.List[typing.Union[int, float]] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_map_attribute` + +```python +def get_number_map_attribute( + terraform_attribute: str +) -> typing.Mapping[typing.Union[int, float]] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_string_attribute` + +```python +def get_string_attribute( + terraform_attribute: str +) -> str +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_string_map_attribute` + +```python +def get_string_map_attribute( + terraform_attribute: str +) -> typing.Mapping[str] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `has_resource_move` + +```python +def has_resource_move() -> typing.Union[TerraformResourceMoveByTarget, TerraformResourceMoveById] +``` + +##### `import_from` + +```python +def import_from( + id: str, + provider: TerraformProvider = None +) -> None +``` + +###### `id`Required + +- *Type:* str + +--- + +###### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +--- + +##### `interpolation_for_attribute` + +```python +def interpolation_for_attribute( + terraform_attribute: str +) -> IResolvable +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `move_from_id` + +```python +def move_from_id( + id: str +) -> None +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `id`Required + +- *Type:* str + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `move_to` + +```python +def move_to( + move_target: str, + index: typing.Union[str, typing.Union[int, float]] = None +) -> None +``` + +Moves this resource to the target resource given by moveTarget. + +###### `move_target`Required + +- *Type:* str + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `index`Optional + +- *Type:* typing.Union[str, typing.Union[int, float]] + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `move_to_id` + +```python +def move_to_id( + id: str +) -> None +``` + +Moves this resource to the resource corresponding to "id". + +###### `id`Required + +- *Type:* str + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `reset_aia_path` + +```python +def reset_aia_path() -> None +``` + +##### `reset_id` + +```python +def reset_id() -> None +``` + +##### `reset_namespace` + +```python +def reset_namespace() -> None +``` + +##### `reset_path` + +```python +def reset_path() -> None +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| is_construct | Checks if `x` is a construct. | +| is_terraform_element | *No description.* | +| is_terraform_resource | *No description.* | +| generate_config_for_import | Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". | + +--- + +##### `is_construct` + +```python +from cdktf_cdktf_provider_vault import pki_secret_backend_config_cluster + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster.is_construct( + x: typing.Any +) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* typing.Any + +Any object. + +--- + +##### `is_terraform_element` + +```python +from cdktf_cdktf_provider_vault import pki_secret_backend_config_cluster + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster.is_terraform_element( + x: typing.Any +) +``` + +###### `x`Required + +- *Type:* typing.Any + +--- + +##### `is_terraform_resource` + +```python +from cdktf_cdktf_provider_vault import pki_secret_backend_config_cluster + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster.is_terraform_resource( + x: typing.Any +) +``` + +###### `x`Required + +- *Type:* typing.Any + +--- + +##### `generate_config_for_import` + +```python +from cdktf_cdktf_provider_vault import pki_secret_backend_config_cluster + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster.generate_config_for_import( + scope: Construct, + import_to_id: str, + import_from_id: str, + provider: TerraformProvider = None +) +``` + +Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". + +###### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +###### `import_to_id`Required + +- *Type:* str + +The construct id used in the generated config for the PkiSecretBackendConfigCluster to import. + +--- + +###### `import_from_id`Required + +- *Type:* str + +The id of the existing PkiSecretBackendConfigCluster that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use + +--- + +###### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +? Optional instance of the provider where the PkiSecretBackendConfigCluster to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | constructs.Node | The tree node. | +| cdktf_stack | cdktf.TerraformStack | *No description.* | +| fqn | str | *No description.* | +| friendly_unique_id | str | *No description.* | +| terraform_meta_arguments | typing.Mapping[typing.Any] | *No description.* | +| terraform_resource_type | str | *No description.* | +| terraform_generator_metadata | cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[typing.Union[int, float], cdktf.TerraformCount] | *No description.* | +| depends_on | typing.List[str] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| aia_path_input | str | *No description.* | +| backend_input | str | *No description.* | +| id_input | str | *No description.* | +| namespace_input | str | *No description.* | +| path_input | str | *No description.* | +| aia_path | str | *No description.* | +| backend | str | *No description.* | +| id | str | *No description.* | +| namespace | str | *No description.* | +| path | str | *No description.* | + +--- + +##### `node`Required + +```python +node: Node +``` + +- *Type:* constructs.Node + +The tree node. + +--- + +##### `cdktf_stack`Required + +```python +cdktf_stack: TerraformStack +``` + +- *Type:* cdktf.TerraformStack + +--- + +##### `fqn`Required + +```python +fqn: str +``` + +- *Type:* str + +--- + +##### `friendly_unique_id`Required + +```python +friendly_unique_id: str +``` + +- *Type:* str + +--- + +##### `terraform_meta_arguments`Required + +```python +terraform_meta_arguments: typing.Mapping[typing.Any] +``` + +- *Type:* typing.Mapping[typing.Any] + +--- + +##### `terraform_resource_type`Required + +```python +terraform_resource_type: str +``` + +- *Type:* str + +--- + +##### `terraform_generator_metadata`Optional + +```python +terraform_generator_metadata: TerraformProviderGeneratorMetadata +``` + +- *Type:* cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```python +connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] +``` + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +```python +count: typing.Union[typing.Union[int, float], TerraformCount] +``` + +- *Type:* typing.Union[typing.Union[int, float], cdktf.TerraformCount] + +--- + +##### `depends_on`Optional + +```python +depends_on: typing.List[str] +``` + +- *Type:* typing.List[str] + +--- + +##### `for_each`Optional + +```python +for_each: ITerraformIterator +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```python +lifecycle: TerraformResourceLifecycle +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```python +provider: TerraformProvider +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```python +provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] +``` + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `aia_path_input`Optional + +```python +aia_path_input: str +``` + +- *Type:* str + +--- + +##### `backend_input`Optional + +```python +backend_input: str +``` + +- *Type:* str + +--- + +##### `id_input`Optional + +```python +id_input: str +``` + +- *Type:* str + +--- + +##### `namespace_input`Optional + +```python +namespace_input: str +``` + +- *Type:* str + +--- + +##### `path_input`Optional + +```python +path_input: str +``` + +- *Type:* str + +--- + +##### `aia_path`Required + +```python +aia_path: str +``` + +- *Type:* str + +--- + +##### `backend`Required + +```python +backend: str +``` + +- *Type:* str + +--- + +##### `id`Required + +```python +id: str +``` + +- *Type:* str + +--- + +##### `namespace`Required + +```python +namespace: str +``` + +- *Type:* str + +--- + +##### `path`Required + +```python +path: str +``` + +- *Type:* str + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | str | *No description.* | + +--- + +##### `tfResourceType`Required + +```python +tfResourceType: str +``` + +- *Type:* str + +--- + +## Structs + +### PkiSecretBackendConfigClusterConfig + +#### Initializer + +```python +from cdktf_cdktf_provider_vault import pki_secret_backend_config_cluster + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigClusterConfig( + connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None, + count: typing.Union[typing.Union[int, float], TerraformCount] = None, + depends_on: typing.List[ITerraformDependable] = None, + for_each: ITerraformIterator = None, + lifecycle: TerraformResourceLifecycle = None, + provider: TerraformProvider = None, + provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, + backend: str, + aia_path: str = None, + id: str = None, + namespace: str = None, + path: str = None +) +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[typing.Union[int, float], cdktf.TerraformCount] | *No description.* | +| depends_on | typing.List[cdktf.ITerraformDependable] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| backend | str | Full path where PKI backend is mounted. | +| aia_path | str | Path to the cluster's AIA distribution point. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| namespace | str | Target namespace. (requires Enterprise). | +| path | str | Path to the cluster's API mount path. | + +--- + +##### `connection`Optional + +```python +connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] +``` + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +```python +count: typing.Union[typing.Union[int, float], TerraformCount] +``` + +- *Type:* typing.Union[typing.Union[int, float], cdktf.TerraformCount] + +--- + +##### `depends_on`Optional + +```python +depends_on: typing.List[ITerraformDependable] +``` + +- *Type:* typing.List[cdktf.ITerraformDependable] + +--- + +##### `for_each`Optional + +```python +for_each: ITerraformIterator +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```python +lifecycle: TerraformResourceLifecycle +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```python +provider: TerraformProvider +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```python +provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] +``` + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `backend`Required + +```python +backend: str +``` + +- *Type:* str + +Full path where PKI backend is mounted. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} + +--- + +##### `aia_path`Optional + +```python +aia_path: str +``` + +- *Type:* str + +Path to the cluster's AIA distribution point. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} + +--- + +##### `id`Optional + +```python +id: str +``` + +- *Type:* str + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```python +namespace: str +``` + +- *Type:* str + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} + +--- + +##### `path`Optional + +```python +path: str +``` + +- *Type:* str + +Path to the cluster's API mount path. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} + +--- + + + diff --git a/docs/pkiSecretBackendConfigCluster.typescript.md b/docs/pkiSecretBackendConfigCluster.typescript.md new file mode 100644 index 00000000..e214ac4b --- /dev/null +++ b/docs/pkiSecretBackendConfigCluster.typescript.md @@ -0,0 +1,974 @@ +# `pkiSecretBackendConfigCluster` Submodule + +## Constructs + +### PkiSecretBackendConfigCluster + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. + +#### Initializers + +```typescript +import { pkiSecretBackendConfigCluster } from '@cdktf/provider-vault' + +new pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster(scope: Construct, id: string, config: PkiSecretBackendConfigClusterConfig) +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | constructs.Construct | The scope in which to define this construct. | +| id | string | The scoped construct ID. | +| config | PkiSecretBackendConfigClusterConfig | *No description.* | + +--- + +##### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `config`Required + +- *Type:* PkiSecretBackendConfigClusterConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| toString | Returns a string representation of this construct. | +| addOverride | *No description.* | +| overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | +| toMetadata | *No description.* | +| toTerraform | Adds this resource to the terraform JSON output. | +| addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| getAnyMapAttribute | *No description.* | +| getBooleanAttribute | *No description.* | +| getBooleanMapAttribute | *No description.* | +| getListAttribute | *No description.* | +| getNumberAttribute | *No description.* | +| getNumberListAttribute | *No description.* | +| getNumberMapAttribute | *No description.* | +| getStringAttribute | *No description.* | +| getStringMapAttribute | *No description.* | +| hasResourceMove | *No description.* | +| importFrom | *No description.* | +| interpolationForAttribute | *No description.* | +| moveFromId | Move the resource corresponding to "id" to this resource. | +| moveTo | Moves this resource to the target resource given by moveTarget. | +| moveToId | Moves this resource to the resource corresponding to "id". | +| resetAiaPath | *No description.* | +| resetId | *No description.* | +| resetNamespace | *No description.* | +| resetPath | *No description.* | + +--- + +##### `toString` + +```typescript +public toString(): string +``` + +Returns a string representation of this construct. + +##### `addOverride` + +```typescript +public addOverride(path: string, value: any): void +``` + +###### `path`Required + +- *Type:* string + +--- + +###### `value`Required + +- *Type:* any + +--- + +##### `overrideLogicalId` + +```typescript +public overrideLogicalId(newLogicalId: string): void +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* string + +The new logical ID to use for this stack element. + +--- + +##### `resetOverrideLogicalId` + +```typescript +public resetOverrideLogicalId(): void +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +##### `toMetadata` + +```typescript +public toMetadata(): any +``` + +##### `toTerraform` + +```typescript +public toTerraform(): any +``` + +Adds this resource to the terraform JSON output. + +##### `addMoveTarget` + +```typescript +public addMoveTarget(moveTarget: string): void +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `moveTarget`Required + +- *Type:* string + +The string move target that will correspond to this resource. + +--- + +##### `getAnyMapAttribute` + +```typescript +public getAnyMapAttribute(terraformAttribute: string): {[ key: string ]: any} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getBooleanAttribute` + +```typescript +public getBooleanAttribute(terraformAttribute: string): IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getBooleanMapAttribute` + +```typescript +public getBooleanMapAttribute(terraformAttribute: string): {[ key: string ]: boolean} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getListAttribute` + +```typescript +public getListAttribute(terraformAttribute: string): string[] +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberAttribute` + +```typescript +public getNumberAttribute(terraformAttribute: string): number +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberListAttribute` + +```typescript +public getNumberListAttribute(terraformAttribute: string): number[] +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberMapAttribute` + +```typescript +public getNumberMapAttribute(terraformAttribute: string): {[ key: string ]: number} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getStringAttribute` + +```typescript +public getStringAttribute(terraformAttribute: string): string +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getStringMapAttribute` + +```typescript +public getStringMapAttribute(terraformAttribute: string): {[ key: string ]: string} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `hasResourceMove` + +```typescript +public hasResourceMove(): TerraformResourceMoveByTarget | TerraformResourceMoveById +``` + +##### `importFrom` + +```typescript +public importFrom(id: string, provider?: TerraformProvider): void +``` + +###### `id`Required + +- *Type:* string + +--- + +###### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +--- + +##### `interpolationForAttribute` + +```typescript +public interpolationForAttribute(terraformAttribute: string): IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `moveFromId` + +```typescript +public moveFromId(id: string): void +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `id`Required + +- *Type:* string + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `moveTo` + +```typescript +public moveTo(moveTarget: string, index?: string | number): void +``` + +Moves this resource to the target resource given by moveTarget. + +###### `moveTarget`Required + +- *Type:* string + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `index`Optional + +- *Type:* string | number + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `moveToId` + +```typescript +public moveToId(id: string): void +``` + +Moves this resource to the resource corresponding to "id". + +###### `id`Required + +- *Type:* string + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `resetAiaPath` + +```typescript +public resetAiaPath(): void +``` + +##### `resetId` + +```typescript +public resetId(): void +``` + +##### `resetNamespace` + +```typescript +public resetNamespace(): void +``` + +##### `resetPath` + +```typescript +public resetPath(): void +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| isConstruct | Checks if `x` is a construct. | +| isTerraformElement | *No description.* | +| isTerraformResource | *No description.* | +| generateConfigForImport | Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". | + +--- + +##### `isConstruct` + +```typescript +import { pkiSecretBackendConfigCluster } from '@cdktf/provider-vault' + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster.isConstruct(x: any) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* any + +Any object. + +--- + +##### `isTerraformElement` + +```typescript +import { pkiSecretBackendConfigCluster } from '@cdktf/provider-vault' + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster.isTerraformElement(x: any) +``` + +###### `x`Required + +- *Type:* any + +--- + +##### `isTerraformResource` + +```typescript +import { pkiSecretBackendConfigCluster } from '@cdktf/provider-vault' + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster.isTerraformResource(x: any) +``` + +###### `x`Required + +- *Type:* any + +--- + +##### `generateConfigForImport` + +```typescript +import { pkiSecretBackendConfigCluster } from '@cdktf/provider-vault' + +pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster.generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: TerraformProvider) +``` + +Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan ". + +###### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +###### `importToId`Required + +- *Type:* string + +The construct id used in the generated config for the PkiSecretBackendConfigCluster to import. + +--- + +###### `importFromId`Required + +- *Type:* string + +The id of the existing PkiSecretBackendConfigCluster that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use + +--- + +###### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +? Optional instance of the provider where the PkiSecretBackendConfigCluster to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | constructs.Node | The tree node. | +| cdktfStack | cdktf.TerraformStack | *No description.* | +| fqn | string | *No description.* | +| friendlyUniqueId | string | *No description.* | +| terraformMetaArguments | {[ key: string ]: any} | *No description.* | +| terraformResourceType | string | *No description.* | +| terraformGeneratorMetadata | cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection | *No description.* | +| count | number \| cdktf.TerraformCount | *No description.* | +| dependsOn | string[] | *No description.* | +| forEach | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | +| aiaPathInput | string | *No description.* | +| backendInput | string | *No description.* | +| idInput | string | *No description.* | +| namespaceInput | string | *No description.* | +| pathInput | string | *No description.* | +| aiaPath | string | *No description.* | +| backend | string | *No description.* | +| id | string | *No description.* | +| namespace | string | *No description.* | +| path | string | *No description.* | + +--- + +##### `node`Required + +```typescript +public readonly node: Node; +``` + +- *Type:* constructs.Node + +The tree node. + +--- + +##### `cdktfStack`Required + +```typescript +public readonly cdktfStack: TerraformStack; +``` + +- *Type:* cdktf.TerraformStack + +--- + +##### `fqn`Required + +```typescript +public readonly fqn: string; +``` + +- *Type:* string + +--- + +##### `friendlyUniqueId`Required + +```typescript +public readonly friendlyUniqueId: string; +``` + +- *Type:* string + +--- + +##### `terraformMetaArguments`Required + +```typescript +public readonly terraformMetaArguments: {[ key: string ]: any}; +``` + +- *Type:* {[ key: string ]: any} + +--- + +##### `terraformResourceType`Required + +```typescript +public readonly terraformResourceType: string; +``` + +- *Type:* string + +--- + +##### `terraformGeneratorMetadata`Optional + +```typescript +public readonly terraformGeneratorMetadata: TerraformProviderGeneratorMetadata; +``` + +- *Type:* cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```typescript +public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection; +``` + +- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```typescript +public readonly count: number | TerraformCount; +``` + +- *Type:* number | cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +```typescript +public readonly dependsOn: string[]; +``` + +- *Type:* string[] + +--- + +##### `forEach`Optional + +```typescript +public readonly forEach: ITerraformIterator; +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```typescript +public readonly lifecycle: TerraformResourceLifecycle; +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```typescript +public readonly provider: TerraformProvider; +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```typescript +public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[]; +``` + +- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[] + +--- + +##### `aiaPathInput`Optional + +```typescript +public readonly aiaPathInput: string; +``` + +- *Type:* string + +--- + +##### `backendInput`Optional + +```typescript +public readonly backendInput: string; +``` + +- *Type:* string + +--- + +##### `idInput`Optional + +```typescript +public readonly idInput: string; +``` + +- *Type:* string + +--- + +##### `namespaceInput`Optional + +```typescript +public readonly namespaceInput: string; +``` + +- *Type:* string + +--- + +##### `pathInput`Optional + +```typescript +public readonly pathInput: string; +``` + +- *Type:* string + +--- + +##### `aiaPath`Required + +```typescript +public readonly aiaPath: string; +``` + +- *Type:* string + +--- + +##### `backend`Required + +```typescript +public readonly backend: string; +``` + +- *Type:* string + +--- + +##### `id`Required + +```typescript +public readonly id: string; +``` + +- *Type:* string + +--- + +##### `namespace`Required + +```typescript +public readonly namespace: string; +``` + +- *Type:* string + +--- + +##### `path`Required + +```typescript +public readonly path: string; +``` + +- *Type:* string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | string | *No description.* | + +--- + +##### `tfResourceType`Required + +```typescript +public readonly tfResourceType: string; +``` + +- *Type:* string + +--- + +## Structs + +### PkiSecretBackendConfigClusterConfig + +#### Initializer + +```typescript +import { pkiSecretBackendConfigCluster } from '@cdktf/provider-vault' + +const pkiSecretBackendConfigClusterConfig: pkiSecretBackendConfigCluster.PkiSecretBackendConfigClusterConfig = { ... } +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection | *No description.* | +| count | number \| cdktf.TerraformCount | *No description.* | +| dependsOn | cdktf.ITerraformDependable[] | *No description.* | +| forEach | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | +| backend | string | Full path where PKI backend is mounted. | +| aiaPath | string | Path to the cluster's AIA distribution point. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| namespace | string | Target namespace. (requires Enterprise). | +| path | string | Path to the cluster's API mount path. | + +--- + +##### `connection`Optional + +```typescript +public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection; +``` + +- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```typescript +public readonly count: number | TerraformCount; +``` + +- *Type:* number | cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +```typescript +public readonly dependsOn: ITerraformDependable[]; +``` + +- *Type:* cdktf.ITerraformDependable[] + +--- + +##### `forEach`Optional + +```typescript +public readonly forEach: ITerraformIterator; +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```typescript +public readonly lifecycle: TerraformResourceLifecycle; +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```typescript +public readonly provider: TerraformProvider; +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```typescript +public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[]; +``` + +- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[] + +--- + +##### `backend`Required + +```typescript +public readonly backend: string; +``` + +- *Type:* string + +Full path where PKI backend is mounted. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} + +--- + +##### `aiaPath`Optional + +```typescript +public readonly aiaPath: string; +``` + +- *Type:* string + +Path to the cluster's AIA distribution point. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} + +--- + +##### `id`Optional + +```typescript +public readonly id: string; +``` + +- *Type:* string + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```typescript +public readonly namespace: string; +``` + +- *Type:* string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} + +--- + +##### `path`Optional + +```typescript +public readonly path: string; +``` + +- *Type:* string + +Path to the cluster's API mount path. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} + +--- + + + diff --git a/docs/pkiSecretBackendConfigIssuers.csharp.md b/docs/pkiSecretBackendConfigIssuers.csharp.md index cc7cdc4a..073d2a03 100644 --- a/docs/pkiSecretBackendConfigIssuers.csharp.md +++ b/docs/pkiSecretBackendConfigIssuers.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigIssu The id of the existing PkiSecretBackendConfigIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use --- @@ -837,7 +837,7 @@ new PkiSecretBackendConfigIssuersConfig { | Backend | string | Full path where PKI backend is mounted. | | Default | string | Specifies the default issuer by ID. | | DefaultFollowsLatestIssuer | object | Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -922,7 +922,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} --- @@ -936,7 +936,7 @@ public string Default { get; set; } Specifies the default issuer by ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} --- @@ -950,7 +950,7 @@ public object DefaultFollowsLatestIssuer { get; set; } Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} --- @@ -962,7 +962,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -979,7 +979,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} --- diff --git a/docs/pkiSecretBackendConfigIssuers.go.md b/docs/pkiSecretBackendConfigIssuers.go.md index b8832e6f..e39526bb 100644 --- a/docs/pkiSecretBackendConfigIssuers.go.md +++ b/docs/pkiSecretBackendConfigIssuers.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendConfigIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.NewPkiSecretBackendConfigIssuers(scope Construct, id *string, config PkiSecretBackendConfigIssuersConfig) PkiSecretBackendConfigIssuers ``` @@ -406,7 +406,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsTerraformElement(x ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_IsTerraformResource( ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigissuers" pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuers_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigIssu The id of the existing PkiSecretBackendConfigIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use --- @@ -805,7 +805,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigissuers" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigissuers" &pkisecretbackendconfigissuers.PkiSecretBackendConfigIssuersConfig { Connection: interface{}, @@ -837,7 +837,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfi | Backend | *string | Full path where PKI backend is mounted. | | Default | *string | Specifies the default issuer by ID. | | DefaultFollowsLatestIssuer | interface{} | Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -922,7 +922,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} --- @@ -936,7 +936,7 @@ Default *string Specifies the default issuer by ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} --- @@ -950,7 +950,7 @@ DefaultFollowsLatestIssuer interface{} Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} --- @@ -962,7 +962,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -979,7 +979,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} --- diff --git a/docs/pkiSecretBackendConfigIssuers.java.md b/docs/pkiSecretBackendConfigIssuers.java.md index 06af9910..bf0acca5 100644 --- a/docs/pkiSecretBackendConfigIssuers.java.md +++ b/docs/pkiSecretBackendConfigIssuers.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. #### Initializers @@ -46,7 +46,7 @@ PkiSecretBackendConfigIssuers.Builder.create(Construct scope, java.lang.String i | backend | java.lang.String | Full path where PKI backend is mounted. | | default | java.lang.String | Specifies the default issuer by ID. | | defaultFollowsLatestIssuer | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer by ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -158,7 +158,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} --- @@ -613,7 +613,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigIssu The id of the existing PkiSecretBackendConfigIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use --- @@ -960,7 +960,7 @@ PkiSecretBackendConfigIssuersConfig.builder() | backend | java.lang.String | Full path where PKI backend is mounted. | | default | java.lang.String | Specifies the default issuer by ID. | | defaultFollowsLatestIssuer | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1045,7 +1045,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} --- @@ -1059,7 +1059,7 @@ public java.lang.String getDefault(); Specifies the default issuer by ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} --- @@ -1073,7 +1073,7 @@ public java.lang.Object getDefaultFollowsLatestIssuer(); Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} --- @@ -1085,7 +1085,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1102,7 +1102,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} --- diff --git a/docs/pkiSecretBackendConfigIssuers.python.md b/docs/pkiSecretBackendConfigIssuers.python.md index 56b2fdbf..f4637692 100644 --- a/docs/pkiSecretBackendConfigIssuers.python.md +++ b/docs/pkiSecretBackendConfigIssuers.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. #### Initializers @@ -43,7 +43,7 @@ pkiSecretBackendConfigIssuers.PkiSecretBackendConfigIssuers( | backend | str | Full path where PKI backend is mounted. | | default | str | Specifies the default issuer by ID. | | default_follows_latest_issuer | typing.Union[bool, cdktf.IResolvable] | Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer by ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigIssu The id of the existing PkiSecretBackendConfigIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use --- @@ -998,7 +998,7 @@ pkiSecretBackendConfigIssuers.PkiSecretBackendConfigIssuersConfig( | backend | str | Full path where PKI backend is mounted. | | default | str | Specifies the default issuer by ID. | | default_follows_latest_issuer | typing.Union[bool, cdktf.IResolvable] | Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1083,7 +1083,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} --- @@ -1097,7 +1097,7 @@ default: str Specifies the default issuer by ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} --- @@ -1111,7 +1111,7 @@ default_follows_latest_issuer: typing.Union[bool, IResolvable] Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} --- @@ -1123,7 +1123,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1140,7 +1140,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} --- diff --git a/docs/pkiSecretBackendConfigIssuers.typescript.md b/docs/pkiSecretBackendConfigIssuers.typescript.md index 1a3c45a3..1a83aeab 100644 --- a/docs/pkiSecretBackendConfigIssuers.typescript.md +++ b/docs/pkiSecretBackendConfigIssuers.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigIssu The id of the existing PkiSecretBackendConfigIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use --- @@ -824,7 +824,7 @@ const pkiSecretBackendConfigIssuersConfig: pkiSecretBackendConfigIssuers.PkiSecr | backend | string | Full path where PKI backend is mounted. | | default | string | Specifies the default issuer by ID. | | defaultFollowsLatestIssuer | boolean \| cdktf.IResolvable | Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -909,7 +909,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} --- @@ -923,7 +923,7 @@ public readonly default: string; Specifies the default issuer by ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} --- @@ -937,7 +937,7 @@ public readonly defaultFollowsLatestIssuer: boolean | IResolvable; Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} --- @@ -949,7 +949,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -966,7 +966,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} --- diff --git a/docs/pkiSecretBackendConfigUrls.csharp.md b/docs/pkiSecretBackendConfigUrls.csharp.md index 7857df40..5eadb526 100644 --- a/docs/pkiSecretBackendConfigUrls.csharp.md +++ b/docs/pkiSecretBackendConfigUrls.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigUrls -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. #### Initializers @@ -74,6 +74,7 @@ Must be unique amongst siblings in the same scope | MoveTo | Moves this resource to the target resource given by moveTarget. | | MoveToId | Moves this resource to the resource corresponding to "id". | | ResetCrlDistributionPoints | *No description.* | +| ResetEnableTemplating | *No description.* | | ResetId | *No description.* | | ResetIssuingCertificates | *No description.* | | ResetNamespace | *No description.* | @@ -375,6 +376,12 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". private void ResetCrlDistributionPoints() ``` +##### `ResetEnableTemplating` + +```csharp +private void ResetEnableTemplating() +``` + ##### `ResetId` ```csharp @@ -502,7 +509,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigUrls The id of the existing PkiSecretBackendConfigUrls that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use --- @@ -534,12 +541,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Provisioners | object[] | *No description.* | | BackendInput | string | *No description.* | | CrlDistributionPointsInput | string[] | *No description.* | +| EnableTemplatingInput | object | *No description.* | | IdInput | string | *No description.* | | IssuingCertificatesInput | string[] | *No description.* | | NamespaceInput | string | *No description.* | | OcspServersInput | string[] | *No description.* | | Backend | string | *No description.* | | CrlDistributionPoints | string[] | *No description.* | +| EnableTemplating | object | *No description.* | | Id | string | *No description.* | | IssuingCertificates | string[] | *No description.* | | Namespace | string | *No description.* | @@ -709,6 +718,16 @@ public string[] CrlDistributionPointsInput { get; } --- +##### `EnableTemplatingInput`Optional + +```csharp +public object EnableTemplatingInput { get; } +``` + +- *Type:* object + +--- + ##### `IdInput`Optional ```csharp @@ -769,6 +788,16 @@ public string[] CrlDistributionPoints { get; } --- +##### `EnableTemplating`Required + +```csharp +public object EnableTemplating { get; } +``` + +- *Type:* object + +--- + ##### `Id`Required ```csharp @@ -846,6 +875,7 @@ new PkiSecretBackendConfigUrlsConfig { object[] Provisioners = null, string Backend, string[] CrlDistributionPoints = null, + object EnableTemplating = null, string Id = null, string[] IssuingCertificates = null, string Namespace = null, @@ -866,7 +896,8 @@ new PkiSecretBackendConfigUrlsConfig { | Provisioners | object[] | *No description.* | | Backend | string | The path of the PKI secret backend the resource belongs to. | | CrlDistributionPoints | string[] | Specifies the URL values for the CRL Distribution Points field. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | +| EnableTemplating | object | Specifies that templating of AIA fields is allowed. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | | IssuingCertificates | string[] | Specifies the URL values for the Issuing Certificate field. | | Namespace | string | Target namespace. (requires Enterprise). | | OcspServers | string[] | Specifies the URL values for the OCSP Servers field. | @@ -953,7 +984,7 @@ public string Backend { get; set; } The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} --- @@ -967,7 +998,21 @@ public string[] CrlDistributionPoints { get; set; } Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} + +--- + +##### `EnableTemplating`Optional + +```csharp +public object EnableTemplating { get; set; } +``` + +- *Type:* object + +Specifies that templating of AIA fields is allowed. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#enable_templating PkiSecretBackendConfigUrls#enable_templating} --- @@ -979,7 +1024,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -996,7 +1041,7 @@ public string[] IssuingCertificates { get; set; } Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} --- @@ -1010,7 +1055,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} --- @@ -1024,7 +1069,7 @@ public string[] OcspServers { get; set; } Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} --- diff --git a/docs/pkiSecretBackendConfigUrls.go.md b/docs/pkiSecretBackendConfigUrls.go.md index b5039f94..b47ef1fd 100644 --- a/docs/pkiSecretBackendConfigUrls.go.md +++ b/docs/pkiSecretBackendConfigUrls.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendConfigUrls -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigurls" pkisecretbackendconfigurls.NewPkiSecretBackendConfigUrls(scope Construct, id *string, config PkiSecretBackendConfigUrlsConfig) PkiSecretBackendConfigUrls ``` @@ -74,6 +74,7 @@ Must be unique amongst siblings in the same scope | MoveTo | Moves this resource to the target resource given by moveTarget. | | MoveToId | Moves this resource to the resource corresponding to "id". | | ResetCrlDistributionPoints | *No description.* | +| ResetEnableTemplating | *No description.* | | ResetId | *No description.* | | ResetIssuingCertificates | *No description.* | | ResetNamespace | *No description.* | @@ -375,6 +376,12 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". func ResetCrlDistributionPoints() ``` +##### `ResetEnableTemplating` + +```go +func ResetEnableTemplating() +``` + ##### `ResetId` ```go @@ -413,7 +420,7 @@ func ResetOcspServers() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigurls" pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigurls" pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsTerraformElement(x inter ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigurls" pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_IsTerraformResource(x inte ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigurls" pkisecretbackendconfigurls.PkiSecretBackendConfigUrls_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +509,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigUrls The id of the existing PkiSecretBackendConfigUrls that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use --- @@ -534,12 +541,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Provisioners | *[]interface{} | *No description.* | | BackendInput | *string | *No description.* | | CrlDistributionPointsInput | *[]*string | *No description.* | +| EnableTemplatingInput | interface{} | *No description.* | | IdInput | *string | *No description.* | | IssuingCertificatesInput | *[]*string | *No description.* | | NamespaceInput | *string | *No description.* | | OcspServersInput | *[]*string | *No description.* | | Backend | *string | *No description.* | | CrlDistributionPoints | *[]*string | *No description.* | +| EnableTemplating | interface{} | *No description.* | | Id | *string | *No description.* | | IssuingCertificates | *[]*string | *No description.* | | Namespace | *string | *No description.* | @@ -709,6 +718,16 @@ func CrlDistributionPointsInput() *[]*string --- +##### `EnableTemplatingInput`Optional + +```go +func EnableTemplatingInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `IdInput`Optional ```go @@ -769,6 +788,16 @@ func CrlDistributionPoints() *[]*string --- +##### `EnableTemplating`Required + +```go +func EnableTemplating() interface{} +``` + +- *Type:* interface{} + +--- + ##### `Id`Required ```go @@ -834,7 +863,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfigurls" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfigurls" &pkisecretbackendconfigurls.PkiSecretBackendConfigUrlsConfig { Connection: interface{}, @@ -846,6 +875,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfi Provisioners: *[]interface{}, Backend: *string, CrlDistributionPoints: *[]*string, + EnableTemplating: interface{}, Id: *string, IssuingCertificates: *[]*string, Namespace: *string, @@ -866,7 +896,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendconfi | Provisioners | *[]interface{} | *No description.* | | Backend | *string | The path of the PKI secret backend the resource belongs to. | | CrlDistributionPoints | *[]*string | Specifies the URL values for the CRL Distribution Points field. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | +| EnableTemplating | interface{} | Specifies that templating of AIA fields is allowed. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | | IssuingCertificates | *[]*string | Specifies the URL values for the Issuing Certificate field. | | Namespace | *string | Target namespace. (requires Enterprise). | | OcspServers | *[]*string | Specifies the URL values for the OCSP Servers field. | @@ -953,7 +984,7 @@ Backend *string The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} --- @@ -967,7 +998,21 @@ CrlDistributionPoints *[]*string Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} + +--- + +##### `EnableTemplating`Optional + +```go +EnableTemplating interface{} +``` + +- *Type:* interface{} + +Specifies that templating of AIA fields is allowed. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#enable_templating PkiSecretBackendConfigUrls#enable_templating} --- @@ -979,7 +1024,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -996,7 +1041,7 @@ IssuingCertificates *[]*string Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} --- @@ -1010,7 +1055,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} --- @@ -1024,7 +1069,7 @@ OcspServers *[]*string Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} --- diff --git a/docs/pkiSecretBackendConfigUrls.java.md b/docs/pkiSecretBackendConfigUrls.java.md index efa1bab6..84b5e703 100644 --- a/docs/pkiSecretBackendConfigUrls.java.md +++ b/docs/pkiSecretBackendConfigUrls.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigUrls -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. #### Initializers @@ -25,6 +25,8 @@ PkiSecretBackendConfigUrls.Builder.create(Construct scope, java.lang.String id) // .provisioners(RemoteExecProvisioner>) .backend(java.lang.String) // .crlDistributionPoints(java.util.List) +// .enableTemplating(java.lang.Boolean) +// .enableTemplating(IResolvable) // .id(java.lang.String) // .issuingCertificates(java.util.List) // .namespace(java.lang.String) @@ -45,7 +47,8 @@ PkiSecretBackendConfigUrls.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The path of the PKI secret backend the resource belongs to. | | crlDistributionPoints | java.util.List | Specifies the URL values for the CRL Distribution Points field. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | +| enableTemplating | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies that templating of AIA fields is allowed. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | | issuingCertificates | java.util.List | Specifies the URL values for the Issuing Certificate field. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspServers | java.util.List | Specifies the URL values for the OCSP Servers field. | @@ -118,7 +121,7 @@ Must be unique amongst siblings in the same scope The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} --- @@ -128,7 +131,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} + +--- + +##### `enableTemplating`Optional + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Specifies that templating of AIA fields is allowed. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#enable_templating PkiSecretBackendConfigUrls#enable_templating} --- @@ -136,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -149,7 +162,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} --- @@ -159,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} --- @@ -169,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} --- @@ -201,6 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | moveTo | Moves this resource to the target resource given by moveTarget. | | moveToId | Moves this resource to the resource corresponding to "id". | | resetCrlDistributionPoints | *No description.* | +| resetEnableTemplating | *No description.* | | resetId | *No description.* | | resetIssuingCertificates | *No description.* | | resetNamespace | *No description.* | @@ -504,6 +518,12 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". public void resetCrlDistributionPoints() ``` +##### `resetEnableTemplating` + +```java +public void resetEnableTemplating() +``` + ##### `resetId` ```java @@ -631,7 +651,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigUrls The id of the existing PkiSecretBackendConfigUrls that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use --- @@ -663,12 +683,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | provisioners | java.util.List | *No description.* | | backendInput | java.lang.String | *No description.* | | crlDistributionPointsInput | java.util.List | *No description.* | +| enableTemplatingInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | idInput | java.lang.String | *No description.* | | issuingCertificatesInput | java.util.List | *No description.* | | namespaceInput | java.lang.String | *No description.* | | ocspServersInput | java.util.List | *No description.* | | backend | java.lang.String | *No description.* | | crlDistributionPoints | java.util.List | *No description.* | +| enableTemplating | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | id | java.lang.String | *No description.* | | issuingCertificates | java.util.List | *No description.* | | namespace | java.lang.String | *No description.* | @@ -838,6 +860,16 @@ public java.util.List getCrlDistributionPointsInput(); --- +##### `enableTemplatingInput`Optional + +```java +public java.lang.Object getEnableTemplatingInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `idInput`Optional ```java @@ -898,6 +930,16 @@ public java.util.List getCrlDistributionPoints(); --- +##### `enableTemplating`Required + +```java +public java.lang.Object getEnableTemplating(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `id`Required ```java @@ -979,6 +1021,8 @@ PkiSecretBackendConfigUrlsConfig.builder() // .provisioners(RemoteExecProvisioner>) .backend(java.lang.String) // .crlDistributionPoints(java.util.List) +// .enableTemplating(java.lang.Boolean) +// .enableTemplating(IResolvable) // .id(java.lang.String) // .issuingCertificates(java.util.List) // .namespace(java.lang.String) @@ -999,7 +1043,8 @@ PkiSecretBackendConfigUrlsConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The path of the PKI secret backend the resource belongs to. | | crlDistributionPoints | java.util.List | Specifies the URL values for the CRL Distribution Points field. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | +| enableTemplating | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies that templating of AIA fields is allowed. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | | issuingCertificates | java.util.List | Specifies the URL values for the Issuing Certificate field. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspServers | java.util.List | Specifies the URL values for the OCSP Servers field. | @@ -1086,7 +1131,7 @@ public java.lang.String getBackend(); The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} --- @@ -1100,7 +1145,21 @@ public java.util.List getCrlDistributionPoints(); Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} + +--- + +##### `enableTemplating`Optional + +```java +public java.lang.Object getEnableTemplating(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Specifies that templating of AIA fields is allowed. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#enable_templating PkiSecretBackendConfigUrls#enable_templating} --- @@ -1112,7 +1171,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1129,7 +1188,7 @@ public java.util.List getIssuingCertificates(); Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} --- @@ -1143,7 +1202,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} --- @@ -1157,7 +1216,7 @@ public java.util.List getOcspServers(); Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} --- diff --git a/docs/pkiSecretBackendConfigUrls.python.md b/docs/pkiSecretBackendConfigUrls.python.md index 77093bf6..1184e47f 100644 --- a/docs/pkiSecretBackendConfigUrls.python.md +++ b/docs/pkiSecretBackendConfigUrls.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigUrls -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. #### Initializers @@ -23,6 +23,7 @@ pkiSecretBackendConfigUrls.PkiSecretBackendConfigUrls( provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, backend: str, crl_distribution_points: typing.List[str] = None, + enable_templating: typing.Union[bool, IResolvable] = None, id: str = None, issuing_certificates: typing.List[str] = None, namespace: str = None, @@ -43,7 +44,8 @@ pkiSecretBackendConfigUrls.PkiSecretBackendConfigUrls( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The path of the PKI secret backend the resource belongs to. | | crl_distribution_points | typing.List[str] | Specifies the URL values for the CRL Distribution Points field. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | +| enable_templating | typing.Union[bool, cdktf.IResolvable] | Specifies that templating of AIA fields is allowed. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | | issuing_certificates | typing.List[str] | Specifies the URL values for the Issuing Certificate field. | | namespace | str | Target namespace. (requires Enterprise). | | ocsp_servers | typing.List[str] | Specifies the URL values for the OCSP Servers field. | @@ -116,7 +118,7 @@ Must be unique amongst siblings in the same scope The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} --- @@ -126,7 +128,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} + +--- + +##### `enable_templating`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Specifies that templating of AIA fields is allowed. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#enable_templating PkiSecretBackendConfigUrls#enable_templating} --- @@ -134,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} --- @@ -157,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} --- @@ -167,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} --- @@ -199,6 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | move_to | Moves this resource to the target resource given by moveTarget. | | move_to_id | Moves this resource to the resource corresponding to "id". | | reset_crl_distribution_points | *No description.* | +| reset_enable_templating | *No description.* | | reset_id | *No description.* | | reset_issuing_certificates | *No description.* | | reset_namespace | *No description.* | @@ -537,6 +550,12 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". def reset_crl_distribution_points() -> None ``` +##### `reset_enable_templating` + +```python +def reset_enable_templating() -> None +``` + ##### `reset_id` ```python @@ -675,7 +694,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigUrls The id of the existing PkiSecretBackendConfigUrls that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use --- @@ -707,12 +726,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend_input | str | *No description.* | | crl_distribution_points_input | typing.List[str] | *No description.* | +| enable_templating_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | id_input | str | *No description.* | | issuing_certificates_input | typing.List[str] | *No description.* | | namespace_input | str | *No description.* | | ocsp_servers_input | typing.List[str] | *No description.* | | backend | str | *No description.* | | crl_distribution_points | typing.List[str] | *No description.* | +| enable_templating | typing.Union[bool, cdktf.IResolvable] | *No description.* | | id | str | *No description.* | | issuing_certificates | typing.List[str] | *No description.* | | namespace | str | *No description.* | @@ -882,6 +903,16 @@ crl_distribution_points_input: typing.List[str] --- +##### `enable_templating_input`Optional + +```python +enable_templating_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `id_input`Optional ```python @@ -942,6 +973,16 @@ crl_distribution_points: typing.List[str] --- +##### `enable_templating`Required + +```python +enable_templating: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `id`Required ```python @@ -1019,6 +1060,7 @@ pkiSecretBackendConfigUrls.PkiSecretBackendConfigUrlsConfig( provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, backend: str, crl_distribution_points: typing.List[str] = None, + enable_templating: typing.Union[bool, IResolvable] = None, id: str = None, issuing_certificates: typing.List[str] = None, namespace: str = None, @@ -1039,7 +1081,8 @@ pkiSecretBackendConfigUrls.PkiSecretBackendConfigUrlsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The path of the PKI secret backend the resource belongs to. | | crl_distribution_points | typing.List[str] | Specifies the URL values for the CRL Distribution Points field. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | +| enable_templating | typing.Union[bool, cdktf.IResolvable] | Specifies that templating of AIA fields is allowed. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | | issuing_certificates | typing.List[str] | Specifies the URL values for the Issuing Certificate field. | | namespace | str | Target namespace. (requires Enterprise). | | ocsp_servers | typing.List[str] | Specifies the URL values for the OCSP Servers field. | @@ -1126,7 +1169,7 @@ backend: str The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} --- @@ -1140,7 +1183,21 @@ crl_distribution_points: typing.List[str] Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} + +--- + +##### `enable_templating`Optional + +```python +enable_templating: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Specifies that templating of AIA fields is allowed. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#enable_templating PkiSecretBackendConfigUrls#enable_templating} --- @@ -1152,7 +1209,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1169,7 +1226,7 @@ issuing_certificates: typing.List[str] Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} --- @@ -1183,7 +1240,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} --- @@ -1197,7 +1254,7 @@ ocsp_servers: typing.List[str] Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} --- diff --git a/docs/pkiSecretBackendConfigUrls.typescript.md b/docs/pkiSecretBackendConfigUrls.typescript.md index fd43f355..77a5d17d 100644 --- a/docs/pkiSecretBackendConfigUrls.typescript.md +++ b/docs/pkiSecretBackendConfigUrls.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigUrls -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls}. #### Initializers @@ -74,6 +74,7 @@ Must be unique amongst siblings in the same scope | moveTo | Moves this resource to the target resource given by moveTarget. | | moveToId | Moves this resource to the resource corresponding to "id". | | resetCrlDistributionPoints | *No description.* | +| resetEnableTemplating | *No description.* | | resetId | *No description.* | | resetIssuingCertificates | *No description.* | | resetNamespace | *No description.* | @@ -375,6 +376,12 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". public resetCrlDistributionPoints(): void ``` +##### `resetEnableTemplating` + +```typescript +public resetEnableTemplating(): void +``` + ##### `resetId` ```typescript @@ -502,7 +509,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigUrls The id of the existing PkiSecretBackendConfigUrls that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use --- @@ -534,12 +541,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backendInput | string | *No description.* | | crlDistributionPointsInput | string[] | *No description.* | +| enableTemplatingInput | boolean \| cdktf.IResolvable | *No description.* | | idInput | string | *No description.* | | issuingCertificatesInput | string[] | *No description.* | | namespaceInput | string | *No description.* | | ocspServersInput | string[] | *No description.* | | backend | string | *No description.* | | crlDistributionPoints | string[] | *No description.* | +| enableTemplating | boolean \| cdktf.IResolvable | *No description.* | | id | string | *No description.* | | issuingCertificates | string[] | *No description.* | | namespace | string | *No description.* | @@ -709,6 +718,16 @@ public readonly crlDistributionPointsInput: string[]; --- +##### `enableTemplatingInput`Optional + +```typescript +public readonly enableTemplatingInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `idInput`Optional ```typescript @@ -769,6 +788,16 @@ public readonly crlDistributionPoints: string[]; --- +##### `enableTemplating`Required + +```typescript +public readonly enableTemplating: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `id`Required ```typescript @@ -852,7 +881,8 @@ const pkiSecretBackendConfigUrlsConfig: pkiSecretBackendConfigUrls.PkiSecretBack | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | The path of the PKI secret backend the resource belongs to. | | crlDistributionPoints | string[] | Specifies the URL values for the CRL Distribution Points field. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | +| enableTemplating | boolean \| cdktf.IResolvable | Specifies that templating of AIA fields is allowed. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. | | issuingCertificates | string[] | Specifies the URL values for the Issuing Certificate field. | | namespace | string | Target namespace. (requires Enterprise). | | ocspServers | string[] | Specifies the URL values for the OCSP Servers field. | @@ -939,7 +969,7 @@ public readonly backend: string; The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} --- @@ -953,7 +983,21 @@ public readonly crlDistributionPoints: string[]; Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} + +--- + +##### `enableTemplating`Optional + +```typescript +public readonly enableTemplating: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Specifies that templating of AIA fields is allowed. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#enable_templating PkiSecretBackendConfigUrls#enable_templating} --- @@ -965,7 +1009,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -982,7 +1026,7 @@ public readonly issuingCertificates: string[]; Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} --- @@ -996,7 +1040,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} --- @@ -1010,7 +1054,7 @@ public readonly ocspServers: string[]; Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} --- diff --git a/docs/pkiSecretBackendCrlConfig.csharp.md b/docs/pkiSecretBackendCrlConfig.csharp.md index 08978826..c8ee66f1 100644 --- a/docs/pkiSecretBackendCrlConfig.csharp.md +++ b/docs/pkiSecretBackendCrlConfig.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCrlConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the PkiSecretBackendCrlConfig The id of the existing PkiSecretBackendCrlConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use --- @@ -1112,7 +1112,7 @@ new PkiSecretBackendCrlConfigConfig { | Disable | object | Disables or enables CRL building. | | EnableDelta | object | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | | Expiry | string | Specifies the time until expiration. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | OcspDisable | object | Disables or enables the OCSP responder in Vault. | | OcspExpiry | string | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | @@ -1201,7 +1201,7 @@ public string Backend { get; set; } The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} --- @@ -1215,7 +1215,7 @@ public object AutoRebuild { get; set; } Enables or disables periodic rebuilding of the CRL upon expiry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} --- @@ -1229,7 +1229,7 @@ public string AutoRebuildGracePeriod { get; set; } Grace period before CRL expiry to attempt rebuild of CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} --- @@ -1243,7 +1243,7 @@ public object CrossClusterRevocation { get; set; } Enable cross-cluster revocation request queues. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} --- @@ -1257,7 +1257,7 @@ public string DeltaRebuildInterval { get; set; } Interval to check for new revocations on, to regenerate the delta CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} --- @@ -1271,7 +1271,7 @@ public object Disable { get; set; } Disables or enables CRL building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} --- @@ -1285,7 +1285,7 @@ public object EnableDelta { get; set; } Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} --- @@ -1299,7 +1299,7 @@ public string Expiry { get; set; } Specifies the time until expiration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} --- @@ -1311,7 +1311,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1328,7 +1328,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} --- @@ -1342,7 +1342,7 @@ public object OcspDisable { get; set; } Disables or enables the OCSP responder in Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} --- @@ -1356,7 +1356,7 @@ public string OcspExpiry { get; set; } The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} --- @@ -1370,7 +1370,7 @@ public object UnifiedCrl { get; set; } Enables unified CRL and OCSP building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} --- @@ -1384,7 +1384,7 @@ public object UnifiedCrlOnExistingPaths { get; set; } Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} --- diff --git a/docs/pkiSecretBackendCrlConfig.go.md b/docs/pkiSecretBackendCrlConfig.go.md index 54199b08..72326c96 100644 --- a/docs/pkiSecretBackendCrlConfig.go.md +++ b/docs/pkiSecretBackendCrlConfig.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendCrlConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.NewPkiSecretBackendCrlConfig(scope Construct, id *string, config PkiSecretBackendCrlConfigConfig) PkiSecretBackendCrlConfig ``` @@ -469,7 +469,7 @@ func ResetUnifiedCrlOnExistingPaths() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsConstruct(x interface{}) *bool ``` @@ -501,7 +501,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformElement(x interface{}) *bool ``` @@ -515,7 +515,7 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interface{}) *bool ``` @@ -529,7 +529,7 @@ pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcrlconfig" pkisecretbackendcrlconfig.PkiSecretBackendCrlConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -558,7 +558,7 @@ The construct id used in the generated config for the PkiSecretBackendCrlConfig The id of the existing PkiSecretBackendCrlConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use --- @@ -1066,7 +1066,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcrlconfig" &pkisecretbackendcrlconfig.PkiSecretBackendCrlConfigConfig { Connection: interface{}, @@ -1112,7 +1112,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendcrlco | Disable | interface{} | Disables or enables CRL building. | | EnableDelta | interface{} | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | | Expiry | *string | Specifies the time until expiration. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | OcspDisable | interface{} | Disables or enables the OCSP responder in Vault. | | OcspExpiry | *string | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | @@ -1201,7 +1201,7 @@ Backend *string The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} --- @@ -1215,7 +1215,7 @@ AutoRebuild interface{} Enables or disables periodic rebuilding of the CRL upon expiry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} --- @@ -1229,7 +1229,7 @@ AutoRebuildGracePeriod *string Grace period before CRL expiry to attempt rebuild of CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} --- @@ -1243,7 +1243,7 @@ CrossClusterRevocation interface{} Enable cross-cluster revocation request queues. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} --- @@ -1257,7 +1257,7 @@ DeltaRebuildInterval *string Interval to check for new revocations on, to regenerate the delta CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} --- @@ -1271,7 +1271,7 @@ Disable interface{} Disables or enables CRL building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} --- @@ -1285,7 +1285,7 @@ EnableDelta interface{} Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} --- @@ -1299,7 +1299,7 @@ Expiry *string Specifies the time until expiration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} --- @@ -1311,7 +1311,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1328,7 +1328,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} --- @@ -1342,7 +1342,7 @@ OcspDisable interface{} Disables or enables the OCSP responder in Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} --- @@ -1356,7 +1356,7 @@ OcspExpiry *string The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} --- @@ -1370,7 +1370,7 @@ UnifiedCrl interface{} Enables unified CRL and OCSP building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} --- @@ -1384,7 +1384,7 @@ UnifiedCrlOnExistingPaths interface{} Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} --- diff --git a/docs/pkiSecretBackendCrlConfig.java.md b/docs/pkiSecretBackendCrlConfig.java.md index 55a673a7..60e6f6e0 100644 --- a/docs/pkiSecretBackendCrlConfig.java.md +++ b/docs/pkiSecretBackendCrlConfig.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCrlConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. #### Initializers @@ -66,7 +66,7 @@ PkiSecretBackendCrlConfig.Builder.create(Construct scope, java.lang.String id) | disable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables or enables CRL building. | | enableDelta | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | | expiry | java.lang.String | Specifies the time until expiration. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspDisable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables or enables the OCSP responder in Vault. | | ocspExpiry | java.lang.String | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | @@ -141,7 +141,7 @@ Must be unique amongst siblings in the same scope The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables or disables periodic rebuilding of the CRL upon expiry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grace period before CRL expiry to attempt rebuild of CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable cross-cluster revocation request queues. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Interval to check for new revocations on, to regenerate the delta CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disables or enables CRL building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the time until expiration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -232,7 +232,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disables or enables the OCSP responder in Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables unified CRL and OCSP building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} --- @@ -790,7 +790,7 @@ The construct id used in the generated config for the PkiSecretBackendCrlConfig The id of the existing PkiSecretBackendCrlConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use --- @@ -1355,7 +1355,7 @@ PkiSecretBackendCrlConfigConfig.builder() | disable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables or enables CRL building. | | enableDelta | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | | expiry | java.lang.String | Specifies the time until expiration. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspDisable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables or enables the OCSP responder in Vault. | | ocspExpiry | java.lang.String | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | @@ -1444,7 +1444,7 @@ public java.lang.String getBackend(); The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} --- @@ -1458,7 +1458,7 @@ public java.lang.Object getAutoRebuild(); Enables or disables periodic rebuilding of the CRL upon expiry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} --- @@ -1472,7 +1472,7 @@ public java.lang.String getAutoRebuildGracePeriod(); Grace period before CRL expiry to attempt rebuild of CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} --- @@ -1486,7 +1486,7 @@ public java.lang.Object getCrossClusterRevocation(); Enable cross-cluster revocation request queues. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} --- @@ -1500,7 +1500,7 @@ public java.lang.String getDeltaRebuildInterval(); Interval to check for new revocations on, to regenerate the delta CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} --- @@ -1514,7 +1514,7 @@ public java.lang.Object getDisable(); Disables or enables CRL building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} --- @@ -1528,7 +1528,7 @@ public java.lang.Object getEnableDelta(); Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} --- @@ -1542,7 +1542,7 @@ public java.lang.String getExpiry(); Specifies the time until expiration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} --- @@ -1554,7 +1554,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1571,7 +1571,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} --- @@ -1585,7 +1585,7 @@ public java.lang.Object getOcspDisable(); Disables or enables the OCSP responder in Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} --- @@ -1599,7 +1599,7 @@ public java.lang.String getOcspExpiry(); The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} --- @@ -1613,7 +1613,7 @@ public java.lang.Object getUnifiedCrl(); Enables unified CRL and OCSP building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} --- @@ -1627,7 +1627,7 @@ public java.lang.Object getUnifiedCrlOnExistingPaths(); Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} --- diff --git a/docs/pkiSecretBackendCrlConfig.python.md b/docs/pkiSecretBackendCrlConfig.python.md index 17c25852..6b150de1 100644 --- a/docs/pkiSecretBackendCrlConfig.python.md +++ b/docs/pkiSecretBackendCrlConfig.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCrlConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. #### Initializers @@ -57,7 +57,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfig( | disable | typing.Union[bool, cdktf.IResolvable] | Disables or enables CRL building. | | enable_delta | typing.Union[bool, cdktf.IResolvable] | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | | expiry | str | Specifies the time until expiration. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ocsp_disable | typing.Union[bool, cdktf.IResolvable] | Disables or enables the OCSP responder in Vault. | | ocsp_expiry | str | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables or disables periodic rebuilding of the CRL upon expiry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grace period before CRL expiry to attempt rebuild of CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable cross-cluster revocation request queues. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Interval to check for new revocations on, to regenerate the delta CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disables or enables CRL building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the time until expiration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -223,7 +223,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disables or enables the OCSP responder in Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables unified CRL and OCSP building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} --- @@ -827,7 +827,7 @@ The construct id used in the generated config for the PkiSecretBackendCrlConfig The id of the existing PkiSecretBackendCrlConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use --- @@ -1381,7 +1381,7 @@ pkiSecretBackendCrlConfig.PkiSecretBackendCrlConfigConfig( | disable | typing.Union[bool, cdktf.IResolvable] | Disables or enables CRL building. | | enable_delta | typing.Union[bool, cdktf.IResolvable] | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | | expiry | str | Specifies the time until expiration. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ocsp_disable | typing.Union[bool, cdktf.IResolvable] | Disables or enables the OCSP responder in Vault. | | ocsp_expiry | str | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | @@ -1470,7 +1470,7 @@ backend: str The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} --- @@ -1484,7 +1484,7 @@ auto_rebuild: typing.Union[bool, IResolvable] Enables or disables periodic rebuilding of the CRL upon expiry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} --- @@ -1498,7 +1498,7 @@ auto_rebuild_grace_period: str Grace period before CRL expiry to attempt rebuild of CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} --- @@ -1512,7 +1512,7 @@ cross_cluster_revocation: typing.Union[bool, IResolvable] Enable cross-cluster revocation request queues. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} --- @@ -1526,7 +1526,7 @@ delta_rebuild_interval: str Interval to check for new revocations on, to regenerate the delta CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} --- @@ -1540,7 +1540,7 @@ disable: typing.Union[bool, IResolvable] Disables or enables CRL building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} --- @@ -1554,7 +1554,7 @@ enable_delta: typing.Union[bool, IResolvable] Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} --- @@ -1568,7 +1568,7 @@ expiry: str Specifies the time until expiration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} --- @@ -1580,7 +1580,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1597,7 +1597,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} --- @@ -1611,7 +1611,7 @@ ocsp_disable: typing.Union[bool, IResolvable] Disables or enables the OCSP responder in Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} --- @@ -1625,7 +1625,7 @@ ocsp_expiry: str The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} --- @@ -1639,7 +1639,7 @@ unified_crl: typing.Union[bool, IResolvable] Enables unified CRL and OCSP building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} --- @@ -1653,7 +1653,7 @@ unified_crl_on_existing_paths: typing.Union[bool, IResolvable] Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} --- diff --git a/docs/pkiSecretBackendCrlConfig.typescript.md b/docs/pkiSecretBackendCrlConfig.typescript.md index 36413830..cc91c3ab 100644 --- a/docs/pkiSecretBackendCrlConfig.typescript.md +++ b/docs/pkiSecretBackendCrlConfig.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCrlConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the PkiSecretBackendCrlConfig The id of the existing PkiSecretBackendCrlConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use --- @@ -1090,7 +1090,7 @@ const pkiSecretBackendCrlConfigConfig: pkiSecretBackendCrlConfig.PkiSecretBacken | disable | boolean \| cdktf.IResolvable | Disables or enables CRL building. | | enableDelta | boolean \| cdktf.IResolvable | Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. | | expiry | string | Specifies the time until expiration. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. | | namespace | string | Target namespace. (requires Enterprise). | | ocspDisable | boolean \| cdktf.IResolvable | Disables or enables the OCSP responder in Vault. | | ocspExpiry | string | The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. | @@ -1179,7 +1179,7 @@ public readonly backend: string; The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} --- @@ -1193,7 +1193,7 @@ public readonly autoRebuild: boolean | IResolvable; Enables or disables periodic rebuilding of the CRL upon expiry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} --- @@ -1207,7 +1207,7 @@ public readonly autoRebuildGracePeriod: string; Grace period before CRL expiry to attempt rebuild of CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} --- @@ -1221,7 +1221,7 @@ public readonly crossClusterRevocation: boolean | IResolvable; Enable cross-cluster revocation request queues. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} --- @@ -1235,7 +1235,7 @@ public readonly deltaRebuildInterval: string; Interval to check for new revocations on, to regenerate the delta CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} --- @@ -1249,7 +1249,7 @@ public readonly disable: boolean | IResolvable; Disables or enables CRL building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} --- @@ -1263,7 +1263,7 @@ public readonly enableDelta: boolean | IResolvable; Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} --- @@ -1277,7 +1277,7 @@ public readonly expiry: string; Specifies the time until expiration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} --- @@ -1289,7 +1289,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1306,7 +1306,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} --- @@ -1320,7 +1320,7 @@ public readonly ocspDisable: boolean | IResolvable; Disables or enables the OCSP responder in Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} --- @@ -1334,7 +1334,7 @@ public readonly ocspExpiry: string; The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} --- @@ -1348,7 +1348,7 @@ public readonly unifiedCrl: boolean | IResolvable; Enables unified CRL and OCSP building. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} --- @@ -1362,7 +1362,7 @@ public readonly unifiedCrlOnExistingPaths: boolean | IResolvable; Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} --- diff --git a/docs/pkiSecretBackendIntermediateCertRequest.csharp.md b/docs/pkiSecretBackendIntermediateCertRequest.csharp.md index acf8467c..6d858135 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.csharp.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIntermediateCertRequest -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. #### Initializers @@ -628,7 +628,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateCertRequest that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use --- @@ -1502,7 +1502,7 @@ new PkiSecretBackendIntermediateCertRequestConfig { | Country | string | The country. | | ExcludeCnFromSans | object | Flag to exclude CN from SANs. | | Format | string | The format of data. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | | IpSans | string[] | List of alternative IPs. | | KeyBits | double | The number of bits to use. | | KeyName | string | When a new key is created with this request, optionally specifies the name for this. | @@ -1603,7 +1603,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} --- @@ -1617,7 +1617,7 @@ public string CommonName { get; set; } CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} --- @@ -1631,7 +1631,7 @@ public string Type { get; set; } Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} --- @@ -1648,7 +1648,7 @@ Set 'CA: true' in a Basic Constraints extension. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} --- @@ -1662,7 +1662,7 @@ public string[] AltNames { get; set; } List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} --- @@ -1676,7 +1676,7 @@ public string Country { get; set; } The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} --- @@ -1690,7 +1690,7 @@ public object ExcludeCnFromSans { get; set; } Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} --- @@ -1704,7 +1704,7 @@ public string Format { get; set; } The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} --- @@ -1716,7 +1716,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1733,7 +1733,7 @@ public string[] IpSans { get; set; } List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} --- @@ -1747,7 +1747,7 @@ public double KeyBits { get; set; } The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} --- @@ -1761,7 +1761,7 @@ public string KeyName { get; set; } When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} --- @@ -1775,7 +1775,7 @@ public string KeyRef { get; set; } Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} --- @@ -1789,7 +1789,7 @@ public string KeyType { get; set; } The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} --- @@ -1803,7 +1803,7 @@ public string Locality { get; set; } The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} --- @@ -1817,7 +1817,7 @@ public string ManagedKeyId { get; set; } The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} --- @@ -1831,7 +1831,7 @@ public string ManagedKeyName { get; set; } The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} --- @@ -1845,7 +1845,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} --- @@ -1859,7 +1859,7 @@ public string Organization { get; set; } The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} --- @@ -1873,7 +1873,7 @@ public string[] OtherSans { get; set; } List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} --- @@ -1887,7 +1887,7 @@ public string Ou { get; set; } The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} --- @@ -1901,7 +1901,7 @@ public string PostalCode { get; set; } The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} --- @@ -1915,7 +1915,7 @@ public string PrivateKeyFormat { get; set; } The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} --- @@ -1929,7 +1929,7 @@ public string Province { get; set; } The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} --- @@ -1943,7 +1943,7 @@ public string StreetAddress { get; set; } The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} --- @@ -1957,7 +1957,7 @@ public string[] UriSans { get; set; } List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} --- diff --git a/docs/pkiSecretBackendIntermediateCertRequest.go.md b/docs/pkiSecretBackendIntermediateCertRequest.go.md index f590d70f..8f1552ee 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.go.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendIntermediateCertRequest -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.NewPkiSecretBackendIntermediateCertRequest(scope Construct, id *string, config PkiSecretBackendIntermediateCertRequestConfig) PkiSecretBackendIntermediateCertRequest ``` @@ -539,7 +539,7 @@ func ResetUriSans() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_IsConstruct(x interface{}) *bool ``` @@ -571,7 +571,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_IsTerraformElement(x interface{}) *bool ``` @@ -585,7 +585,7 @@ pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_ ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_IsTerraformResource(x interface{}) *bool ``` @@ -599,7 +599,7 @@ pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatecertrequest" pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequest_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -628,7 +628,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateCertRequest that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use --- @@ -1444,7 +1444,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatecertrequest" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatecertrequest" &pkisecretbackendintermediatecertrequest.PkiSecretBackendIntermediateCertRequestConfig { Connection: interface{}, @@ -1502,7 +1502,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendinter | Country | *string | The country. | | ExcludeCnFromSans | interface{} | Flag to exclude CN from SANs. | | Format | *string | The format of data. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | | IpSans | *[]*string | List of alternative IPs. | | KeyBits | *f64 | The number of bits to use. | | KeyName | *string | When a new key is created with this request, optionally specifies the name for this. | @@ -1603,7 +1603,7 @@ Backend *string The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} --- @@ -1617,7 +1617,7 @@ CommonName *string CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} --- @@ -1631,7 +1631,7 @@ Type *string Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} --- @@ -1648,7 +1648,7 @@ Set 'CA: true' in a Basic Constraints extension. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} --- @@ -1662,7 +1662,7 @@ AltNames *[]*string List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} --- @@ -1676,7 +1676,7 @@ Country *string The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} --- @@ -1690,7 +1690,7 @@ ExcludeCnFromSans interface{} Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} --- @@ -1704,7 +1704,7 @@ Format *string The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} --- @@ -1716,7 +1716,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1733,7 +1733,7 @@ IpSans *[]*string List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} --- @@ -1747,7 +1747,7 @@ KeyBits *f64 The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} --- @@ -1761,7 +1761,7 @@ KeyName *string When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} --- @@ -1775,7 +1775,7 @@ KeyRef *string Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} --- @@ -1789,7 +1789,7 @@ KeyType *string The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} --- @@ -1803,7 +1803,7 @@ Locality *string The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} --- @@ -1817,7 +1817,7 @@ ManagedKeyId *string The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} --- @@ -1831,7 +1831,7 @@ ManagedKeyName *string The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} --- @@ -1845,7 +1845,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} --- @@ -1859,7 +1859,7 @@ Organization *string The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} --- @@ -1873,7 +1873,7 @@ OtherSans *[]*string List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} --- @@ -1887,7 +1887,7 @@ Ou *string The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} --- @@ -1901,7 +1901,7 @@ PostalCode *string The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} --- @@ -1915,7 +1915,7 @@ PrivateKeyFormat *string The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} --- @@ -1929,7 +1929,7 @@ Province *string The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} --- @@ -1943,7 +1943,7 @@ StreetAddress *string The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} --- @@ -1957,7 +1957,7 @@ UriSans *[]*string List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} --- diff --git a/docs/pkiSecretBackendIntermediateCertRequest.java.md b/docs/pkiSecretBackendIntermediateCertRequest.java.md index 0a9f16f9..719d7816 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.java.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIntermediateCertRequest -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. #### Initializers @@ -73,7 +73,7 @@ PkiSecretBackendIntermediateCertRequest.Builder.create(Construct scope, java.lan | country | java.lang.String | The country. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | | ipSans | java.util.List | List of alternative IPs. | | keyBits | java.lang.Number | The number of bits to use. | | keyName | java.lang.String | When a new key is created with this request, optionally specifies the name for this. | @@ -160,7 +160,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} --- @@ -193,7 +193,7 @@ Set 'CA: true' in a Basic Constraints extension. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -254,7 +254,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} --- @@ -264,7 +264,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} --- @@ -274,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} --- @@ -284,7 +284,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} --- @@ -294,7 +294,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} --- @@ -304,7 +304,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} --- @@ -314,7 +314,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} --- @@ -324,7 +324,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} --- @@ -334,7 +334,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} --- @@ -344,7 +344,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} --- @@ -354,7 +354,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} --- @@ -364,7 +364,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} --- @@ -374,7 +374,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} --- @@ -384,7 +384,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} --- @@ -394,7 +394,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} --- @@ -404,7 +404,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} --- @@ -414,7 +414,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} --- @@ -1002,7 +1002,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateCertRequest that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use --- @@ -1882,7 +1882,7 @@ PkiSecretBackendIntermediateCertRequestConfig.builder() | country | java.lang.String | The country. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | | ipSans | java.util.List | List of alternative IPs. | | keyBits | java.lang.Number | The number of bits to use. | | keyName | java.lang.String | When a new key is created with this request, optionally specifies the name for this. | @@ -1983,7 +1983,7 @@ public java.lang.String getBackend(); The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} --- @@ -1997,7 +1997,7 @@ public java.lang.String getCommonName(); CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} --- @@ -2011,7 +2011,7 @@ public java.lang.String getType(); Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} --- @@ -2028,7 +2028,7 @@ Set 'CA: true' in a Basic Constraints extension. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} --- @@ -2042,7 +2042,7 @@ public java.util.List getAltNames(); List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} --- @@ -2056,7 +2056,7 @@ public java.lang.String getCountry(); The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} --- @@ -2070,7 +2070,7 @@ public java.lang.Object getExcludeCnFromSans(); Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} --- @@ -2084,7 +2084,7 @@ public java.lang.String getFormat(); The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} --- @@ -2096,7 +2096,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2113,7 +2113,7 @@ public java.util.List getIpSans(); List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} --- @@ -2127,7 +2127,7 @@ public java.lang.Number getKeyBits(); The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} --- @@ -2141,7 +2141,7 @@ public java.lang.String getKeyName(); When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} --- @@ -2155,7 +2155,7 @@ public java.lang.String getKeyRef(); Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} --- @@ -2169,7 +2169,7 @@ public java.lang.String getKeyType(); The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} --- @@ -2183,7 +2183,7 @@ public java.lang.String getLocality(); The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} --- @@ -2197,7 +2197,7 @@ public java.lang.String getManagedKeyId(); The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} --- @@ -2211,7 +2211,7 @@ public java.lang.String getManagedKeyName(); The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} --- @@ -2225,7 +2225,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} --- @@ -2239,7 +2239,7 @@ public java.lang.String getOrganization(); The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} --- @@ -2253,7 +2253,7 @@ public java.util.List getOtherSans(); List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} --- @@ -2267,7 +2267,7 @@ public java.lang.String getOu(); The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} --- @@ -2281,7 +2281,7 @@ public java.lang.String getPostalCode(); The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} --- @@ -2295,7 +2295,7 @@ public java.lang.String getPrivateKeyFormat(); The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} --- @@ -2309,7 +2309,7 @@ public java.lang.String getProvince(); The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} --- @@ -2323,7 +2323,7 @@ public java.lang.String getStreetAddress(); The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} --- @@ -2337,7 +2337,7 @@ public java.util.List getUriSans(); List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} --- diff --git a/docs/pkiSecretBackendIntermediateCertRequest.python.md b/docs/pkiSecretBackendIntermediateCertRequest.python.md index 9950cd77..1da57868 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.python.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIntermediateCertRequest -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. #### Initializers @@ -69,7 +69,7 @@ pkiSecretBackendIntermediateCertRequest.PkiSecretBackendIntermediateCertRequest( | country | str | The country. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | key_bits | typing.Union[int, float] | The number of bits to use. | | key_name | str | When a new key is created with this request, optionally specifies the name for this. | @@ -156,7 +156,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} --- @@ -189,7 +189,7 @@ Set 'CA: true' in a Basic Constraints extension. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} --- @@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -250,7 +250,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} --- @@ -260,7 +260,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} --- @@ -270,7 +270,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} --- @@ -280,7 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} --- @@ -290,7 +290,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} --- @@ -300,7 +300,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} --- @@ -310,7 +310,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} --- @@ -320,7 +320,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} --- @@ -330,7 +330,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} --- @@ -340,7 +340,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} --- @@ -350,7 +350,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} --- @@ -360,7 +360,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} --- @@ -370,7 +370,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} --- @@ -380,7 +380,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} --- @@ -390,7 +390,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} --- @@ -400,7 +400,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} --- @@ -410,7 +410,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} --- @@ -1044,7 +1044,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateCertRequest that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use --- @@ -1918,7 +1918,7 @@ pkiSecretBackendIntermediateCertRequest.PkiSecretBackendIntermediateCertRequestC | country | str | The country. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | key_bits | typing.Union[int, float] | The number of bits to use. | | key_name | str | When a new key is created with this request, optionally specifies the name for this. | @@ -2019,7 +2019,7 @@ backend: str The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} --- @@ -2033,7 +2033,7 @@ common_name: str CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} --- @@ -2047,7 +2047,7 @@ type: str Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} --- @@ -2064,7 +2064,7 @@ Set 'CA: true' in a Basic Constraints extension. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} --- @@ -2078,7 +2078,7 @@ alt_names: typing.List[str] List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} --- @@ -2092,7 +2092,7 @@ country: str The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} --- @@ -2106,7 +2106,7 @@ exclude_cn_from_sans: typing.Union[bool, IResolvable] Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} --- @@ -2120,7 +2120,7 @@ format: str The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} --- @@ -2132,7 +2132,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2149,7 +2149,7 @@ ip_sans: typing.List[str] List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} --- @@ -2163,7 +2163,7 @@ key_bits: typing.Union[int, float] The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} --- @@ -2177,7 +2177,7 @@ key_name: str When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} --- @@ -2191,7 +2191,7 @@ key_ref: str Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} --- @@ -2205,7 +2205,7 @@ key_type: str The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} --- @@ -2219,7 +2219,7 @@ locality: str The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} --- @@ -2233,7 +2233,7 @@ managed_key_id: str The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} --- @@ -2247,7 +2247,7 @@ managed_key_name: str The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} --- @@ -2261,7 +2261,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} --- @@ -2275,7 +2275,7 @@ organization: str The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} --- @@ -2289,7 +2289,7 @@ other_sans: typing.List[str] List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} --- @@ -2303,7 +2303,7 @@ ou: str The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} --- @@ -2317,7 +2317,7 @@ postal_code: str The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} --- @@ -2331,7 +2331,7 @@ private_key_format: str The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} --- @@ -2345,7 +2345,7 @@ province: str The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} --- @@ -2359,7 +2359,7 @@ street_address: str The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} --- @@ -2373,7 +2373,7 @@ uri_sans: typing.List[str] List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} --- diff --git a/docs/pkiSecretBackendIntermediateCertRequest.typescript.md b/docs/pkiSecretBackendIntermediateCertRequest.typescript.md index f9881fd3..04477969 100644 --- a/docs/pkiSecretBackendIntermediateCertRequest.typescript.md +++ b/docs/pkiSecretBackendIntermediateCertRequest.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIntermediateCertRequest -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request}. #### Initializers @@ -628,7 +628,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateCertRequest that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use --- @@ -1468,7 +1468,7 @@ const pkiSecretBackendIntermediateCertRequestConfig: pkiSecretBackendIntermediat | country | string | The country. | | excludeCnFromSans | boolean \| cdktf.IResolvable | Flag to exclude CN from SANs. | | format | string | The format of data. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. | | ipSans | string[] | List of alternative IPs. | | keyBits | number | The number of bits to use. | | keyName | string | When a new key is created with this request, optionally specifies the name for this. | @@ -1569,7 +1569,7 @@ public readonly backend: string; The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} --- @@ -1583,7 +1583,7 @@ public readonly commonName: string; CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} --- @@ -1597,7 +1597,7 @@ public readonly type: string; Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} --- @@ -1614,7 +1614,7 @@ Set 'CA: true' in a Basic Constraints extension. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} --- @@ -1628,7 +1628,7 @@ public readonly altNames: string[]; List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} --- @@ -1642,7 +1642,7 @@ public readonly country: string; The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} --- @@ -1656,7 +1656,7 @@ public readonly excludeCnFromSans: boolean | IResolvable; Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} --- @@ -1670,7 +1670,7 @@ public readonly format: string; The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} --- @@ -1682,7 +1682,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1699,7 +1699,7 @@ public readonly ipSans: string[]; List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} --- @@ -1713,7 +1713,7 @@ public readonly keyBits: number; The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} --- @@ -1727,7 +1727,7 @@ public readonly keyName: string; When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} --- @@ -1741,7 +1741,7 @@ public readonly keyRef: string; Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} --- @@ -1755,7 +1755,7 @@ public readonly keyType: string; The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} --- @@ -1769,7 +1769,7 @@ public readonly locality: string; The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} --- @@ -1783,7 +1783,7 @@ public readonly managedKeyId: string; The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} --- @@ -1797,7 +1797,7 @@ public readonly managedKeyName: string; The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} --- @@ -1811,7 +1811,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} --- @@ -1825,7 +1825,7 @@ public readonly organization: string; The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} --- @@ -1839,7 +1839,7 @@ public readonly otherSans: string[]; List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} --- @@ -1853,7 +1853,7 @@ public readonly ou: string; The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} --- @@ -1867,7 +1867,7 @@ public readonly postalCode: string; The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} --- @@ -1881,7 +1881,7 @@ public readonly privateKeyFormat: string; The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} --- @@ -1895,7 +1895,7 @@ public readonly province: string; The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} --- @@ -1909,7 +1909,7 @@ public readonly streetAddress: string; The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} --- @@ -1923,7 +1923,7 @@ public readonly uriSans: string[]; List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} --- diff --git a/docs/pkiSecretBackendIntermediateSetSigned.csharp.md b/docs/pkiSecretBackendIntermediateSetSigned.csharp.md index 07ca90ad..3f3e5245 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.csharp.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIntermediateSetSigned -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateSetSigned that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use --- @@ -821,7 +821,7 @@ new PkiSecretBackendIntermediateSetSignedConfig { | Provisioners | object[] | *No description.* | | Backend | string | The PKI secret backend the resource belongs to. | | Certificate | string | The certificate. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -906,7 +906,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} --- @@ -920,7 +920,7 @@ public string Certificate { get; set; } The certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} --- @@ -932,7 +932,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -949,7 +949,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} --- diff --git a/docs/pkiSecretBackendIntermediateSetSigned.go.md b/docs/pkiSecretBackendIntermediateSetSigned.go.md index 4f8c813e..b04d6315 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.go.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendIntermediateSetSigned -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.NewPkiSecretBackendIntermediateSetSigned(scope Construct, id *string, config PkiSecretBackendIntermediateSetSignedConfig) PkiSecretBackendIntermediateSetSigned ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsTe ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_IsTe ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatesetsigned" pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSigned_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateSetSigned that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use --- @@ -791,7 +791,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendintermediatesetsigned" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendintermediatesetsigned" &pkisecretbackendintermediatesetsigned.PkiSecretBackendIntermediateSetSignedConfig { Connection: interface{}, @@ -821,7 +821,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendinter | Provisioners | *[]interface{} | *No description.* | | Backend | *string | The PKI secret backend the resource belongs to. | | Certificate | *string | The certificate. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -906,7 +906,7 @@ Backend *string The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} --- @@ -920,7 +920,7 @@ Certificate *string The certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} --- @@ -932,7 +932,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -949,7 +949,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} --- diff --git a/docs/pkiSecretBackendIntermediateSetSigned.java.md b/docs/pkiSecretBackendIntermediateSetSigned.java.md index 1ab7cee0..2ed6a69d 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.java.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIntermediateSetSigned -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. #### Initializers @@ -43,7 +43,7 @@ PkiSecretBackendIntermediateSetSigned.Builder.create(Construct scope, java.lang. | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The PKI secret backend the resource belongs to. | | certificate | java.lang.String | The certificate. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateSetSigned that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use --- @@ -930,7 +930,7 @@ PkiSecretBackendIntermediateSetSignedConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The PKI secret backend the resource belongs to. | | certificate | java.lang.String | The certificate. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1015,7 +1015,7 @@ public java.lang.String getBackend(); The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} --- @@ -1029,7 +1029,7 @@ public java.lang.String getCertificate(); The certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} --- @@ -1041,7 +1041,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1058,7 +1058,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} --- diff --git a/docs/pkiSecretBackendIntermediateSetSigned.python.md b/docs/pkiSecretBackendIntermediateSetSigned.python.md index bc45d78f..30045769 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.python.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIntermediateSetSigned -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. #### Initializers @@ -41,7 +41,7 @@ pkiSecretBackendIntermediateSetSigned.PkiSecretBackendIntermediateSetSigned( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The PKI secret backend the resource belongs to. | | certificate | str | The certificate. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateSetSigned that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use --- @@ -970,7 +970,7 @@ pkiSecretBackendIntermediateSetSigned.PkiSecretBackendIntermediateSetSignedConfi | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The PKI secret backend the resource belongs to. | | certificate | str | The certificate. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1055,7 +1055,7 @@ backend: str The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} --- @@ -1069,7 +1069,7 @@ certificate: str The certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} --- @@ -1081,7 +1081,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1098,7 +1098,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} --- diff --git a/docs/pkiSecretBackendIntermediateSetSigned.typescript.md b/docs/pkiSecretBackendIntermediateSetSigned.typescript.md index d2dc8ff4..51786876 100644 --- a/docs/pkiSecretBackendIntermediateSetSigned.typescript.md +++ b/docs/pkiSecretBackendIntermediateSetSigned.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIntermediateSetSigned -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PkiSecretBackendIntermedia The id of the existing PkiSecretBackendIntermediateSetSigned that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use --- @@ -809,7 +809,7 @@ const pkiSecretBackendIntermediateSetSignedConfig: pkiSecretBackendIntermediateS | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | The PKI secret backend the resource belongs to. | | certificate | string | The certificate. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -894,7 +894,7 @@ public readonly backend: string; The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} --- @@ -908,7 +908,7 @@ public readonly certificate: string; The certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} --- @@ -920,7 +920,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -937,7 +937,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} --- diff --git a/docs/pkiSecretBackendIssuer.csharp.md b/docs/pkiSecretBackendIssuer.csharp.md index 4736d390..bbf5ebb6 100644 --- a/docs/pkiSecretBackendIssuer.csharp.md +++ b/docs/pkiSecretBackendIssuer.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the PkiSecretBackendIssuer to The id of the existing PkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -1082,7 +1082,7 @@ new PkiSecretBackendIssuerConfig { | IssuerRef | string | Reference to an existing issuer. | | CrlDistributionPoints | string[] | Specifies the URL values for the CRL Distribution Points field. | | EnableAiaUrlTemplating | object | Specifies that the AIA URL values should be templated. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | | IssuerName | string | Reference to an existing issuer. | | IssuingCertificates | string[] | Specifies the URL values for the Issuing Certificate field. | | LeafNotAfterBehavior | string | Behavior of a leaf's 'NotAfter' field during issuance. | @@ -1174,7 +1174,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} --- @@ -1188,7 +1188,7 @@ public string IssuerRef { get; set; } Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} --- @@ -1202,7 +1202,7 @@ public string[] CrlDistributionPoints { get; set; } Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} --- @@ -1216,7 +1216,7 @@ public object EnableAiaUrlTemplating { get; set; } Specifies that the AIA URL values should be templated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} --- @@ -1228,7 +1228,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1245,7 +1245,7 @@ public string IssuerName { get; set; } Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} --- @@ -1259,7 +1259,7 @@ public string[] IssuingCertificates { get; set; } Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} --- @@ -1273,7 +1273,7 @@ public string LeafNotAfterBehavior { get; set; } Behavior of a leaf's 'NotAfter' field during issuance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} --- @@ -1287,7 +1287,7 @@ public string[] ManualChain { get; set; } Chain of issuer references to build this issuer's computed CAChain field from, when non-empty. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} --- @@ -1301,7 +1301,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} --- @@ -1315,7 +1315,7 @@ public string[] OcspServers { get; set; } Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} --- @@ -1329,7 +1329,7 @@ public string RevocationSignatureAlgorithm { get; set; } Which signature algorithm to use when building CRLs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} --- @@ -1343,7 +1343,7 @@ public string Usage { get; set; } Comma-separated list of allowed usages for this issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} --- diff --git a/docs/pkiSecretBackendIssuer.go.md b/docs/pkiSecretBackendIssuer.go.md index bb5ea15c..72148fe5 100644 --- a/docs/pkiSecretBackendIssuer.go.md +++ b/docs/pkiSecretBackendIssuer.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendissuer" pkisecretbackendissuer.NewPkiSecretBackendIssuer(scope Construct, id *string, config PkiSecretBackendIssuerConfig) PkiSecretBackendIssuer ``` @@ -455,7 +455,7 @@ func ResetUsage() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendissuer" pkisecretbackendissuer.PkiSecretBackendIssuer_IsConstruct(x interface{}) *bool ``` @@ -487,7 +487,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendissuer" pkisecretbackendissuer.PkiSecretBackendIssuer_IsTerraformElement(x interface{}) *bool ``` @@ -501,7 +501,7 @@ pkisecretbackendissuer.PkiSecretBackendIssuer_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendissuer" pkisecretbackendissuer.PkiSecretBackendIssuer_IsTerraformResource(x interface{}) *bool ``` @@ -515,7 +515,7 @@ pkisecretbackendissuer.PkiSecretBackendIssuer_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendissuer" pkisecretbackendissuer.PkiSecretBackendIssuer_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -544,7 +544,7 @@ The construct id used in the generated config for the PkiSecretBackendIssuer to The id of the existing PkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -1041,7 +1041,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissuer" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendissuer" &pkisecretbackendissuer.PkiSecretBackendIssuerConfig { Connection: interface{}, @@ -1082,7 +1082,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendissue | IssuerRef | *string | Reference to an existing issuer. | | CrlDistributionPoints | *[]*string | Specifies the URL values for the CRL Distribution Points field. | | EnableAiaUrlTemplating | interface{} | Specifies that the AIA URL values should be templated. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | | IssuerName | *string | Reference to an existing issuer. | | IssuingCertificates | *[]*string | Specifies the URL values for the Issuing Certificate field. | | LeafNotAfterBehavior | *string | Behavior of a leaf's 'NotAfter' field during issuance. | @@ -1174,7 +1174,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} --- @@ -1188,7 +1188,7 @@ IssuerRef *string Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} --- @@ -1202,7 +1202,7 @@ CrlDistributionPoints *[]*string Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} --- @@ -1216,7 +1216,7 @@ EnableAiaUrlTemplating interface{} Specifies that the AIA URL values should be templated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} --- @@ -1228,7 +1228,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1245,7 +1245,7 @@ IssuerName *string Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} --- @@ -1259,7 +1259,7 @@ IssuingCertificates *[]*string Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} --- @@ -1273,7 +1273,7 @@ LeafNotAfterBehavior *string Behavior of a leaf's 'NotAfter' field during issuance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} --- @@ -1287,7 +1287,7 @@ ManualChain *[]*string Chain of issuer references to build this issuer's computed CAChain field from, when non-empty. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} --- @@ -1301,7 +1301,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} --- @@ -1315,7 +1315,7 @@ OcspServers *[]*string Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} --- @@ -1329,7 +1329,7 @@ RevocationSignatureAlgorithm *string Which signature algorithm to use when building CRLs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} --- @@ -1343,7 +1343,7 @@ Usage *string Comma-separated list of allowed usages for this issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} --- diff --git a/docs/pkiSecretBackendIssuer.java.md b/docs/pkiSecretBackendIssuer.java.md index bcebba9d..9724e0b1 100644 --- a/docs/pkiSecretBackendIssuer.java.md +++ b/docs/pkiSecretBackendIssuer.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -55,7 +55,7 @@ PkiSecretBackendIssuer.Builder.create(Construct scope, java.lang.String id) | issuerRef | java.lang.String | Reference to an existing issuer. | | crlDistributionPoints | java.util.List | Specifies the URL values for the CRL Distribution Points field. | | enableAiaUrlTemplating | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies that the AIA URL values should be templated. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | | issuerName | java.lang.String | Reference to an existing issuer. | | issuingCertificates | java.util.List | Specifies the URL values for the Issuing Certificate field. | | leafNotAfterBehavior | java.lang.String | Behavior of a leaf's 'NotAfter' field during issuance. | @@ -133,7 +133,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies that the AIA URL values should be templated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -184,7 +184,7 @@ If you experience problems setting this value it might not be settable. Please t Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Behavior of a leaf's 'NotAfter' field during issuance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Chain of issuer references to build this issuer's computed CAChain field from, when non-empty. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} --- @@ -224,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} --- @@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} --- @@ -244,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Which signature algorithm to use when building CRLs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} --- @@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Comma-separated list of allowed usages for this issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} --- @@ -758,7 +758,7 @@ The construct id used in the generated config for the PkiSecretBackendIssuer to The id of the existing PkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -1301,7 +1301,7 @@ PkiSecretBackendIssuerConfig.builder() | issuerRef | java.lang.String | Reference to an existing issuer. | | crlDistributionPoints | java.util.List | Specifies the URL values for the CRL Distribution Points field. | | enableAiaUrlTemplating | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies that the AIA URL values should be templated. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | | issuerName | java.lang.String | Reference to an existing issuer. | | issuingCertificates | java.util.List | Specifies the URL values for the Issuing Certificate field. | | leafNotAfterBehavior | java.lang.String | Behavior of a leaf's 'NotAfter' field during issuance. | @@ -1393,7 +1393,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} --- @@ -1407,7 +1407,7 @@ public java.lang.String getIssuerRef(); Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} --- @@ -1421,7 +1421,7 @@ public java.util.List getCrlDistributionPoints(); Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} --- @@ -1435,7 +1435,7 @@ public java.lang.Object getEnableAiaUrlTemplating(); Specifies that the AIA URL values should be templated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} --- @@ -1447,7 +1447,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1464,7 +1464,7 @@ public java.lang.String getIssuerName(); Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} --- @@ -1478,7 +1478,7 @@ public java.util.List getIssuingCertificates(); Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} --- @@ -1492,7 +1492,7 @@ public java.lang.String getLeafNotAfterBehavior(); Behavior of a leaf's 'NotAfter' field during issuance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} --- @@ -1506,7 +1506,7 @@ public java.util.List getManualChain(); Chain of issuer references to build this issuer's computed CAChain field from, when non-empty. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} --- @@ -1520,7 +1520,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} --- @@ -1534,7 +1534,7 @@ public java.util.List getOcspServers(); Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} --- @@ -1548,7 +1548,7 @@ public java.lang.String getRevocationSignatureAlgorithm(); Which signature algorithm to use when building CRLs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} --- @@ -1562,7 +1562,7 @@ public java.lang.String getUsage(); Comma-separated list of allowed usages for this issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} --- diff --git a/docs/pkiSecretBackendIssuer.python.md b/docs/pkiSecretBackendIssuer.python.md index aea5628a..a192d281 100644 --- a/docs/pkiSecretBackendIssuer.python.md +++ b/docs/pkiSecretBackendIssuer.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -52,7 +52,7 @@ pkiSecretBackendIssuer.PkiSecretBackendIssuer( | issuer_ref | str | Reference to an existing issuer. | | crl_distribution_points | typing.List[str] | Specifies the URL values for the CRL Distribution Points field. | | enable_aia_url_templating | typing.Union[bool, cdktf.IResolvable] | Specifies that the AIA URL values should be templated. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | | issuer_name | str | Reference to an existing issuer. | | issuing_certificates | typing.List[str] | Specifies the URL values for the Issuing Certificate field. | | leaf_not_after_behavior | str | Behavior of a leaf's 'NotAfter' field during issuance. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies that the AIA URL values should be templated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Behavior of a leaf's 'NotAfter' field during issuance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Chain of issuer references to build this issuer's computed CAChain field from, when non-empty. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Which signature algorithm to use when building CRLs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Comma-separated list of allowed usages for this issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} --- @@ -801,7 +801,7 @@ The construct id used in the generated config for the PkiSecretBackendIssuer to The id of the existing PkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -1339,7 +1339,7 @@ pkiSecretBackendIssuer.PkiSecretBackendIssuerConfig( | issuer_ref | str | Reference to an existing issuer. | | crl_distribution_points | typing.List[str] | Specifies the URL values for the CRL Distribution Points field. | | enable_aia_url_templating | typing.Union[bool, cdktf.IResolvable] | Specifies that the AIA URL values should be templated. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | | issuer_name | str | Reference to an existing issuer. | | issuing_certificates | typing.List[str] | Specifies the URL values for the Issuing Certificate field. | | leaf_not_after_behavior | str | Behavior of a leaf's 'NotAfter' field during issuance. | @@ -1431,7 +1431,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} --- @@ -1445,7 +1445,7 @@ issuer_ref: str Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} --- @@ -1459,7 +1459,7 @@ crl_distribution_points: typing.List[str] Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} --- @@ -1473,7 +1473,7 @@ enable_aia_url_templating: typing.Union[bool, IResolvable] Specifies that the AIA URL values should be templated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} --- @@ -1485,7 +1485,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1502,7 +1502,7 @@ issuer_name: str Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} --- @@ -1516,7 +1516,7 @@ issuing_certificates: typing.List[str] Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} --- @@ -1530,7 +1530,7 @@ leaf_not_after_behavior: str Behavior of a leaf's 'NotAfter' field during issuance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} --- @@ -1544,7 +1544,7 @@ manual_chain: typing.List[str] Chain of issuer references to build this issuer's computed CAChain field from, when non-empty. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} --- @@ -1558,7 +1558,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} --- @@ -1572,7 +1572,7 @@ ocsp_servers: typing.List[str] Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} --- @@ -1586,7 +1586,7 @@ revocation_signature_algorithm: str Which signature algorithm to use when building CRLs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} --- @@ -1600,7 +1600,7 @@ usage: str Comma-separated list of allowed usages for this issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} --- diff --git a/docs/pkiSecretBackendIssuer.typescript.md b/docs/pkiSecretBackendIssuer.typescript.md index b6d74dc6..4cb10613 100644 --- a/docs/pkiSecretBackendIssuer.typescript.md +++ b/docs/pkiSecretBackendIssuer.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the PkiSecretBackendIssuer to The id of the existing PkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -1061,7 +1061,7 @@ const pkiSecretBackendIssuerConfig: pkiSecretBackendIssuer.PkiSecretBackendIssue | issuerRef | string | Reference to an existing issuer. | | crlDistributionPoints | string[] | Specifies the URL values for the CRL Distribution Points field. | | enableAiaUrlTemplating | boolean \| cdktf.IResolvable | Specifies that the AIA URL values should be templated. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. | | issuerName | string | Reference to an existing issuer. | | issuingCertificates | string[] | Specifies the URL values for the Issuing Certificate field. | | leafNotAfterBehavior | string | Behavior of a leaf's 'NotAfter' field during issuance. | @@ -1153,7 +1153,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} --- @@ -1167,7 +1167,7 @@ public readonly issuerRef: string; Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} --- @@ -1181,7 +1181,7 @@ public readonly crlDistributionPoints: string[]; Specifies the URL values for the CRL Distribution Points field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} --- @@ -1195,7 +1195,7 @@ public readonly enableAiaUrlTemplating: boolean | IResolvable; Specifies that the AIA URL values should be templated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} --- @@ -1207,7 +1207,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1224,7 +1224,7 @@ public readonly issuerName: string; Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} --- @@ -1238,7 +1238,7 @@ public readonly issuingCertificates: string[]; Specifies the URL values for the Issuing Certificate field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} --- @@ -1252,7 +1252,7 @@ public readonly leafNotAfterBehavior: string; Behavior of a leaf's 'NotAfter' field during issuance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} --- @@ -1266,7 +1266,7 @@ public readonly manualChain: string[]; Chain of issuer references to build this issuer's computed CAChain field from, when non-empty. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} --- @@ -1280,7 +1280,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} --- @@ -1294,7 +1294,7 @@ public readonly ocspServers: string[]; Specifies the URL values for the OCSP Servers field. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} --- @@ -1308,7 +1308,7 @@ public readonly revocationSignatureAlgorithm: string; Which signature algorithm to use when building CRLs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} --- @@ -1322,7 +1322,7 @@ public readonly usage: string; Comma-separated list of allowed usages for this issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} --- diff --git a/docs/pkiSecretBackendKey.csharp.md b/docs/pkiSecretBackendKey.csharp.md index d0ebfd44..db9ab6cf 100644 --- a/docs/pkiSecretBackendKey.csharp.md +++ b/docs/pkiSecretBackendKey.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the PkiSecretBackendKey to imp The id of the existing PkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -960,7 +960,7 @@ new PkiSecretBackendKeyConfig { | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | | Type | string | Specifies the type of the key to create. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | | KeyBits | double | Specifies the number of bits to use for the generated keys. | | KeyName | string | When a new key is created with this request, optionally specifies the name for this. | | KeyType | string | Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. | @@ -1050,7 +1050,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} --- @@ -1064,7 +1064,7 @@ public string Type { get; set; } Specifies the type of the key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} --- @@ -1076,7 +1076,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1093,7 +1093,7 @@ public double KeyBits { get; set; } Specifies the number of bits to use for the generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} --- @@ -1107,7 +1107,7 @@ public string KeyName { get; set; } When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} --- @@ -1121,7 +1121,7 @@ public string KeyType { get; set; } Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} --- @@ -1135,7 +1135,7 @@ public string ManagedKeyId { get; set; } The managed key's UUID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} --- @@ -1149,7 +1149,7 @@ public string ManagedKeyName { get; set; } The managed key's configured name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} --- @@ -1163,7 +1163,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} --- diff --git a/docs/pkiSecretBackendKey.go.md b/docs/pkiSecretBackendKey.go.md index 45958a89..f745a0b8 100644 --- a/docs/pkiSecretBackendKey.go.md +++ b/docs/pkiSecretBackendKey.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendkey" pkisecretbackendkey.NewPkiSecretBackendKey(scope Construct, id *string, config PkiSecretBackendKeyConfig) PkiSecretBackendKey ``` @@ -427,7 +427,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendkey" pkisecretbackendkey.PkiSecretBackendKey_IsConstruct(x interface{}) *bool ``` @@ -459,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendkey" pkisecretbackendkey.PkiSecretBackendKey_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +473,7 @@ pkisecretbackendkey.PkiSecretBackendKey_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendkey" pkisecretbackendkey.PkiSecretBackendKey_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +487,7 @@ pkisecretbackendkey.PkiSecretBackendKey_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendkey" pkisecretbackendkey.PkiSecretBackendKey_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -516,7 +516,7 @@ The construct id used in the generated config for the PkiSecretBackendKey to imp The id of the existing PkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -925,7 +925,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendkey" &pkisecretbackendkey.PkiSecretBackendKeyConfig { Connection: interface{}, @@ -960,7 +960,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendkey" | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | | Type | *string | Specifies the type of the key to create. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | | KeyBits | *f64 | Specifies the number of bits to use for the generated keys. | | KeyName | *string | When a new key is created with this request, optionally specifies the name for this. | | KeyType | *string | Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. | @@ -1050,7 +1050,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} --- @@ -1064,7 +1064,7 @@ Type *string Specifies the type of the key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} --- @@ -1076,7 +1076,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1093,7 +1093,7 @@ KeyBits *f64 Specifies the number of bits to use for the generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} --- @@ -1107,7 +1107,7 @@ KeyName *string When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} --- @@ -1121,7 +1121,7 @@ KeyType *string Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} --- @@ -1135,7 +1135,7 @@ ManagedKeyId *string The managed key's UUID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} --- @@ -1149,7 +1149,7 @@ ManagedKeyName *string The managed key's configured name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} --- @@ -1163,7 +1163,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} --- diff --git a/docs/pkiSecretBackendKey.java.md b/docs/pkiSecretBackendKey.java.md index 00c81bd9..df0f19b0 100644 --- a/docs/pkiSecretBackendKey.java.md +++ b/docs/pkiSecretBackendKey.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -48,7 +48,7 @@ PkiSecretBackendKey.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | type | java.lang.String | Specifies the type of the key to create. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | | keyBits | java.lang.Number | Specifies the number of bits to use for the generated keys. | | keyName | java.lang.String | When a new key is created with this request, optionally specifies the name for this. | | keyType | java.lang.String | Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of the key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the number of bits to use for the generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The managed key's UUID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The managed key's configured name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} --- @@ -681,7 +681,7 @@ The construct id used in the generated config for the PkiSecretBackendKey to imp The id of the existing PkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -1129,7 +1129,7 @@ PkiSecretBackendKeyConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | type | java.lang.String | Specifies the type of the key to create. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | | keyBits | java.lang.Number | Specifies the number of bits to use for the generated keys. | | keyName | java.lang.String | When a new key is created with this request, optionally specifies the name for this. | | keyType | java.lang.String | Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. | @@ -1219,7 +1219,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} --- @@ -1233,7 +1233,7 @@ public java.lang.String getType(); Specifies the type of the key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} --- @@ -1245,7 +1245,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1262,7 +1262,7 @@ public java.lang.Number getKeyBits(); Specifies the number of bits to use for the generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} --- @@ -1276,7 +1276,7 @@ public java.lang.String getKeyName(); When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} --- @@ -1290,7 +1290,7 @@ public java.lang.String getKeyType(); Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} --- @@ -1304,7 +1304,7 @@ public java.lang.String getManagedKeyId(); The managed key's UUID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} --- @@ -1318,7 +1318,7 @@ public java.lang.String getManagedKeyName(); The managed key's configured name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} --- @@ -1332,7 +1332,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} --- diff --git a/docs/pkiSecretBackendKey.python.md b/docs/pkiSecretBackendKey.python.md index 4d11c305..064dce5b 100644 --- a/docs/pkiSecretBackendKey.python.md +++ b/docs/pkiSecretBackendKey.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -46,7 +46,7 @@ pkiSecretBackendKey.PkiSecretBackendKey( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | type | str | Specifies the type of the key to create. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | | key_bits | typing.Union[int, float] | Specifies the number of bits to use for the generated keys. | | key_name | str | When a new key is created with this request, optionally specifies the name for this. | | key_type | str | Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of the key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the number of bits to use for the generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The managed key's UUID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The managed key's configured name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} --- @@ -725,7 +725,7 @@ The construct id used in the generated config for the PkiSecretBackendKey to imp The id of the existing PkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -1169,7 +1169,7 @@ pkiSecretBackendKey.PkiSecretBackendKeyConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | type | str | Specifies the type of the key to create. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | | key_bits | typing.Union[int, float] | Specifies the number of bits to use for the generated keys. | | key_name | str | When a new key is created with this request, optionally specifies the name for this. | | key_type | str | Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. | @@ -1259,7 +1259,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} --- @@ -1273,7 +1273,7 @@ type: str Specifies the type of the key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} --- @@ -1285,7 +1285,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1302,7 +1302,7 @@ key_bits: typing.Union[int, float] Specifies the number of bits to use for the generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} --- @@ -1316,7 +1316,7 @@ key_name: str When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} --- @@ -1330,7 +1330,7 @@ key_type: str Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} --- @@ -1344,7 +1344,7 @@ managed_key_id: str The managed key's UUID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} --- @@ -1358,7 +1358,7 @@ managed_key_name: str The managed key's configured name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} --- @@ -1372,7 +1372,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} --- diff --git a/docs/pkiSecretBackendKey.typescript.md b/docs/pkiSecretBackendKey.typescript.md index f5762d79..cb044ab5 100644 --- a/docs/pkiSecretBackendKey.typescript.md +++ b/docs/pkiSecretBackendKey.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the PkiSecretBackendKey to imp The id of the existing PkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -943,7 +943,7 @@ const pkiSecretBackendKeyConfig: pkiSecretBackendKey.PkiSecretBackendKeyConfig = | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | | type | string | Specifies the type of the key to create. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. | | keyBits | number | Specifies the number of bits to use for the generated keys. | | keyName | string | When a new key is created with this request, optionally specifies the name for this. | | keyType | string | Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. | @@ -1033,7 +1033,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} --- @@ -1047,7 +1047,7 @@ public readonly type: string; Specifies the type of the key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} --- @@ -1059,7 +1059,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ public readonly keyBits: number; Specifies the number of bits to use for the generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} --- @@ -1090,7 +1090,7 @@ public readonly keyName: string; When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} --- @@ -1104,7 +1104,7 @@ public readonly keyType: string; Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} --- @@ -1118,7 +1118,7 @@ public readonly managedKeyId: string; The managed key's UUID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} --- @@ -1132,7 +1132,7 @@ public readonly managedKeyName: string; The managed key's configured name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} --- @@ -1146,7 +1146,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} --- diff --git a/docs/pkiSecretBackendRole.csharp.md b/docs/pkiSecretBackendRole.csharp.md index 22491353..f1d78171 100644 --- a/docs/pkiSecretBackendRole.csharp.md +++ b/docs/pkiSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. #### Initializers @@ -795,7 +795,7 @@ The construct id used in the generated config for the PkiSecretBackendRole to im The id of the existing PkiSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2125,7 +2125,7 @@ new PkiSecretBackendRoleConfig { | ExtKeyUsage | string[] | Specify the allowed extended key usage constraint on issued certificates. | | ExtKeyUsageOids | string[] | A list of extended key usage OIDs. | | GenerateLease | object | Flag to generate leases with certificates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | | IssuerRef | string | Specifies the default issuer of this request. | | KeyBits | double | The number of bits of generated keys. | | KeyType | string | The generated key type. | @@ -2230,7 +2230,7 @@ public string Backend { get; set; } The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} --- @@ -2244,7 +2244,7 @@ public string Name { get; set; } Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} --- @@ -2258,7 +2258,7 @@ public object AllowAnyName { get; set; } Flag to allow any name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} --- @@ -2272,7 +2272,7 @@ public object AllowBareDomains { get; set; } Flag to allow certificates matching the actual domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} --- @@ -2286,7 +2286,7 @@ public string[] AllowedDomains { get; set; } The domains of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} --- @@ -2300,7 +2300,7 @@ public object AllowedDomainsTemplate { get; set; } Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} --- @@ -2314,7 +2314,7 @@ public string[] AllowedOtherSans { get; set; } Defines allowed custom SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} --- @@ -2328,7 +2328,7 @@ public string[] AllowedSerialNumbers { get; set; } Defines allowed Subject serial numbers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} --- @@ -2342,7 +2342,7 @@ public string[] AllowedUriSans { get; set; } Defines allowed URI SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} --- @@ -2356,7 +2356,7 @@ public object AllowedUriSansTemplate { get; set; } Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} --- @@ -2370,7 +2370,7 @@ public string[] AllowedUserIds { get; set; } The allowed User ID's. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} --- @@ -2384,7 +2384,7 @@ public object AllowGlobDomains { get; set; } Flag to allow names containing glob patterns. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} --- @@ -2398,7 +2398,7 @@ public object AllowIpSans { get; set; } Flag to allow IP SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} --- @@ -2412,7 +2412,7 @@ public object AllowLocalhost { get; set; } Flag to allow certificates for localhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} --- @@ -2426,7 +2426,7 @@ public object AllowSubdomains { get; set; } Flag to allow certificates matching subdomains. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} --- @@ -2440,7 +2440,7 @@ public object AllowWildcardCertificates { get; set; } Flag to allow wildcard certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} --- @@ -2454,7 +2454,7 @@ public object BasicConstraintsValidForNonCa { get; set; } Flag to mark basic constraints valid when issuing non-CA certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} --- @@ -2468,7 +2468,7 @@ public object ClientFlag { get; set; } Flag to specify certificates for client use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} --- @@ -2482,7 +2482,7 @@ public object CodeSigningFlag { get; set; } Flag to specify certificates for code signing use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} --- @@ -2496,7 +2496,7 @@ public string[] Country { get; set; } The country of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} --- @@ -2510,7 +2510,7 @@ public object EmailProtectionFlag { get; set; } Flag to specify certificates for email protection use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} --- @@ -2524,7 +2524,7 @@ public object EnforceHostnames { get; set; } Flag to allow only valid host names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} --- @@ -2538,7 +2538,7 @@ public string[] ExtKeyUsage { get; set; } Specify the allowed extended key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} --- @@ -2552,7 +2552,7 @@ public string[] ExtKeyUsageOids { get; set; } A list of extended key usage OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} --- @@ -2566,7 +2566,7 @@ public object GenerateLease { get; set; } Flag to generate leases with certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} --- @@ -2578,7 +2578,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2595,7 +2595,7 @@ public string IssuerRef { get; set; } Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} --- @@ -2609,7 +2609,7 @@ public double KeyBits { get; set; } The number of bits of generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} --- @@ -2623,7 +2623,7 @@ public string KeyType { get; set; } The generated key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} --- @@ -2637,7 +2637,7 @@ public string[] KeyUsage { get; set; } Specify the allowed key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} --- @@ -2651,7 +2651,7 @@ public string[] Locality { get; set; } The locality of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} --- @@ -2665,7 +2665,7 @@ public string MaxTtl { get; set; } The maximum TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} --- @@ -2679,7 +2679,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} --- @@ -2693,7 +2693,7 @@ public object NoStore { get; set; } Flag to not store certificates in the storage backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} --- @@ -2707,7 +2707,7 @@ public string NotBeforeDuration { get; set; } Specifies the duration by which to backdate the NotBefore property. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} --- @@ -2721,7 +2721,7 @@ public string[] Organization { get; set; } The organization of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} --- @@ -2735,7 +2735,7 @@ public string[] Ou { get; set; } The organization unit of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} --- @@ -2749,7 +2749,7 @@ public object PolicyIdentifier { get; set; } policy_identifier block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} --- @@ -2763,7 +2763,7 @@ public string[] PolicyIdentifiers { get; set; } Specify the list of allowed policies OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} --- @@ -2777,7 +2777,7 @@ public string[] PostalCode { get; set; } The postal code of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} --- @@ -2791,7 +2791,7 @@ public string[] Province { get; set; } The province of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} --- @@ -2805,7 +2805,7 @@ public object RequireCn { get; set; } Flag to force CN usage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} --- @@ -2819,7 +2819,7 @@ public object ServerFlag { get; set; } Flag to specify certificates for server use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} --- @@ -2833,7 +2833,7 @@ public string[] StreetAddress { get; set; } The street address of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} --- @@ -2847,7 +2847,7 @@ public string Ttl { get; set; } The TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} --- @@ -2861,7 +2861,7 @@ public object UseCsrCommonName { get; set; } Flag to use the CN in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} --- @@ -2875,7 +2875,7 @@ public object UseCsrSans { get; set; } Flag to use the SANs in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} --- @@ -2913,7 +2913,7 @@ public string Oid { get; set; } OID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} --- @@ -2927,7 +2927,7 @@ public string Cps { get; set; } Optional CPS URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} --- @@ -2941,7 +2941,7 @@ public string Notice { get; set; } Optional notice. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} --- diff --git a/docs/pkiSecretBackendRole.go.md b/docs/pkiSecretBackendRole.go.md index 77756041..ff2af90b 100644 --- a/docs/pkiSecretBackendRole.go.md +++ b/docs/pkiSecretBackendRole.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrole" pkisecretbackendrole.NewPkiSecretBackendRole(scope Construct, id *string, config PkiSecretBackendRoleConfig) PkiSecretBackendRole ``` @@ -706,7 +706,7 @@ func ResetUseCsrSans() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrole" pkisecretbackendrole.PkiSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -738,7 +738,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrole" pkisecretbackendrole.PkiSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -752,7 +752,7 @@ pkisecretbackendrole.PkiSecretBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrole" pkisecretbackendrole.PkiSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -766,7 +766,7 @@ pkisecretbackendrole.PkiSecretBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrole" pkisecretbackendrole.PkiSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -795,7 +795,7 @@ The construct id used in the generated config for the PkiSecretBackendRole to im The id of the existing PkiSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2029,7 +2029,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrole" &pkisecretbackendrole.PkiSecretBackendRoleConfig { Connection: interface{}, @@ -2125,7 +2125,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" | ExtKeyUsage | *[]*string | Specify the allowed extended key usage constraint on issued certificates. | | ExtKeyUsageOids | *[]*string | A list of extended key usage OIDs. | | GenerateLease | interface{} | Flag to generate leases with certificates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | | IssuerRef | *string | Specifies the default issuer of this request. | | KeyBits | *f64 | The number of bits of generated keys. | | KeyType | *string | The generated key type. | @@ -2230,7 +2230,7 @@ Backend *string The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} --- @@ -2244,7 +2244,7 @@ Name *string Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} --- @@ -2258,7 +2258,7 @@ AllowAnyName interface{} Flag to allow any name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} --- @@ -2272,7 +2272,7 @@ AllowBareDomains interface{} Flag to allow certificates matching the actual domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} --- @@ -2286,7 +2286,7 @@ AllowedDomains *[]*string The domains of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} --- @@ -2300,7 +2300,7 @@ AllowedDomainsTemplate interface{} Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} --- @@ -2314,7 +2314,7 @@ AllowedOtherSans *[]*string Defines allowed custom SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} --- @@ -2328,7 +2328,7 @@ AllowedSerialNumbers *[]*string Defines allowed Subject serial numbers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} --- @@ -2342,7 +2342,7 @@ AllowedUriSans *[]*string Defines allowed URI SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} --- @@ -2356,7 +2356,7 @@ AllowedUriSansTemplate interface{} Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} --- @@ -2370,7 +2370,7 @@ AllowedUserIds *[]*string The allowed User ID's. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} --- @@ -2384,7 +2384,7 @@ AllowGlobDomains interface{} Flag to allow names containing glob patterns. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} --- @@ -2398,7 +2398,7 @@ AllowIpSans interface{} Flag to allow IP SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} --- @@ -2412,7 +2412,7 @@ AllowLocalhost interface{} Flag to allow certificates for localhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} --- @@ -2426,7 +2426,7 @@ AllowSubdomains interface{} Flag to allow certificates matching subdomains. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} --- @@ -2440,7 +2440,7 @@ AllowWildcardCertificates interface{} Flag to allow wildcard certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} --- @@ -2454,7 +2454,7 @@ BasicConstraintsValidForNonCa interface{} Flag to mark basic constraints valid when issuing non-CA certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} --- @@ -2468,7 +2468,7 @@ ClientFlag interface{} Flag to specify certificates for client use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} --- @@ -2482,7 +2482,7 @@ CodeSigningFlag interface{} Flag to specify certificates for code signing use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} --- @@ -2496,7 +2496,7 @@ Country *[]*string The country of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} --- @@ -2510,7 +2510,7 @@ EmailProtectionFlag interface{} Flag to specify certificates for email protection use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} --- @@ -2524,7 +2524,7 @@ EnforceHostnames interface{} Flag to allow only valid host names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} --- @@ -2538,7 +2538,7 @@ ExtKeyUsage *[]*string Specify the allowed extended key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} --- @@ -2552,7 +2552,7 @@ ExtKeyUsageOids *[]*string A list of extended key usage OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} --- @@ -2566,7 +2566,7 @@ GenerateLease interface{} Flag to generate leases with certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} --- @@ -2578,7 +2578,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2595,7 +2595,7 @@ IssuerRef *string Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} --- @@ -2609,7 +2609,7 @@ KeyBits *f64 The number of bits of generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} --- @@ -2623,7 +2623,7 @@ KeyType *string The generated key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} --- @@ -2637,7 +2637,7 @@ KeyUsage *[]*string Specify the allowed key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} --- @@ -2651,7 +2651,7 @@ Locality *[]*string The locality of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} --- @@ -2665,7 +2665,7 @@ MaxTtl *string The maximum TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} --- @@ -2679,7 +2679,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} --- @@ -2693,7 +2693,7 @@ NoStore interface{} Flag to not store certificates in the storage backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} --- @@ -2707,7 +2707,7 @@ NotBeforeDuration *string Specifies the duration by which to backdate the NotBefore property. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} --- @@ -2721,7 +2721,7 @@ Organization *[]*string The organization of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} --- @@ -2735,7 +2735,7 @@ Ou *[]*string The organization unit of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} --- @@ -2749,7 +2749,7 @@ PolicyIdentifier interface{} policy_identifier block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} --- @@ -2763,7 +2763,7 @@ PolicyIdentifiers *[]*string Specify the list of allowed policies OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} --- @@ -2777,7 +2777,7 @@ PostalCode *[]*string The postal code of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} --- @@ -2791,7 +2791,7 @@ Province *[]*string The province of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} --- @@ -2805,7 +2805,7 @@ RequireCn interface{} Flag to force CN usage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} --- @@ -2819,7 +2819,7 @@ ServerFlag interface{} Flag to specify certificates for server use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} --- @@ -2833,7 +2833,7 @@ StreetAddress *[]*string The street address of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} --- @@ -2847,7 +2847,7 @@ Ttl *string The TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} --- @@ -2861,7 +2861,7 @@ UseCsrCommonName interface{} Flag to use the CN in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} --- @@ -2875,7 +2875,7 @@ UseCsrSans interface{} Flag to use the SANs in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} --- @@ -2884,7 +2884,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrole" &pkisecretbackendrole.PkiSecretBackendRolePolicyIdentifier { Oid: *string, @@ -2913,7 +2913,7 @@ Oid *string OID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} --- @@ -2927,7 +2927,7 @@ Cps *string Optional CPS URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} --- @@ -2941,7 +2941,7 @@ Notice *string Optional notice. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} --- @@ -2952,7 +2952,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrole" pkisecretbackendrole.NewPkiSecretBackendRolePolicyIdentifierList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) PkiSecretBackendRolePolicyIdentifierList ``` @@ -3112,7 +3112,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrole" pkisecretbackendrole.NewPkiSecretBackendRolePolicyIdentifierOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) PkiSecretBackendRolePolicyIdentifierOutputReference ``` diff --git a/docs/pkiSecretBackendRole.java.md b/docs/pkiSecretBackendRole.java.md index f63c500b..d55413d2 100644 --- a/docs/pkiSecretBackendRole.java.md +++ b/docs/pkiSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. #### Initializers @@ -130,7 +130,7 @@ PkiSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | extKeyUsage | java.util.List | Specify the allowed extended key usage constraint on issued certificates. | | extKeyUsageOids | java.util.List | A list of extended key usage OIDs. | | generateLease | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to generate leases with certificates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | keyBits | java.lang.Number | The number of bits of generated keys. | | keyType | java.lang.String | The generated key type. | @@ -221,7 +221,7 @@ Must be unique amongst siblings in the same scope The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow any name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow certificates matching the actual domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The domains of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Defines allowed custom SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Defines allowed Subject serial numbers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} --- @@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Defines allowed URI SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} --- @@ -321,7 +321,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The allowed User ID's. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} --- @@ -331,7 +331,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow names containing glob patterns. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} --- @@ -341,7 +341,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow IP SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} --- @@ -351,7 +351,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow certificates for localhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} --- @@ -361,7 +361,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow certificates matching subdomains. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} --- @@ -371,7 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow wildcard certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} --- @@ -381,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to mark basic constraints valid when issuing non-CA certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} --- @@ -391,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to specify certificates for client use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} --- @@ -401,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to specify certificates for code signing use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} --- @@ -411,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The country of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} --- @@ -421,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to specify certificates for email protection use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} --- @@ -431,7 +431,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow only valid host names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} --- @@ -441,7 +441,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specify the allowed extended key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} --- @@ -451,7 +451,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of extended key usage OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} --- @@ -461,7 +461,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to generate leases with certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} --- @@ -469,7 +469,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -482,7 +482,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} --- @@ -492,7 +492,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of bits of generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} --- @@ -502,7 +502,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The generated key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} --- @@ -512,7 +512,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specify the allowed key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} --- @@ -522,7 +522,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The locality of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} --- @@ -532,7 +532,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} --- @@ -542,7 +542,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} --- @@ -552,7 +552,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to not store certificates in the storage backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} --- @@ -562,7 +562,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the duration by which to backdate the NotBefore property. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} --- @@ -572,7 +572,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} --- @@ -582,7 +582,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization unit of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} --- @@ -592,7 +592,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi policy_identifier block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} --- @@ -602,7 +602,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specify the list of allowed policies OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} --- @@ -612,7 +612,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The postal code of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} --- @@ -622,7 +622,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The province of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} --- @@ -632,7 +632,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to force CN usage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} --- @@ -642,7 +642,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to specify certificates for server use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} --- @@ -652,7 +652,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The street address of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} --- @@ -662,7 +662,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} --- @@ -672,7 +672,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to use the CN in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} --- @@ -682,7 +682,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to use the SANs in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} --- @@ -1437,7 +1437,7 @@ The construct id used in the generated config for the PkiSecretBackendRole to im The id of the existing PkiSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2792,7 +2792,7 @@ PkiSecretBackendRoleConfig.builder() | extKeyUsage | java.util.List | Specify the allowed extended key usage constraint on issued certificates. | | extKeyUsageOids | java.util.List | A list of extended key usage OIDs. | | generateLease | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to generate leases with certificates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | keyBits | java.lang.Number | The number of bits of generated keys. | | keyType | java.lang.String | The generated key type. | @@ -2897,7 +2897,7 @@ public java.lang.String getBackend(); The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} --- @@ -2911,7 +2911,7 @@ public java.lang.String getName(); Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} --- @@ -2925,7 +2925,7 @@ public java.lang.Object getAllowAnyName(); Flag to allow any name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} --- @@ -2939,7 +2939,7 @@ public java.lang.Object getAllowBareDomains(); Flag to allow certificates matching the actual domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} --- @@ -2953,7 +2953,7 @@ public java.util.List getAllowedDomains(); The domains of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} --- @@ -2967,7 +2967,7 @@ public java.lang.Object getAllowedDomainsTemplate(); Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} --- @@ -2981,7 +2981,7 @@ public java.util.List getAllowedOtherSans(); Defines allowed custom SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} --- @@ -2995,7 +2995,7 @@ public java.util.List getAllowedSerialNumbers(); Defines allowed Subject serial numbers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} --- @@ -3009,7 +3009,7 @@ public java.util.List getAllowedUriSans(); Defines allowed URI SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} --- @@ -3023,7 +3023,7 @@ public java.lang.Object getAllowedUriSansTemplate(); Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} --- @@ -3037,7 +3037,7 @@ public java.util.List getAllowedUserIds(); The allowed User ID's. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} --- @@ -3051,7 +3051,7 @@ public java.lang.Object getAllowGlobDomains(); Flag to allow names containing glob patterns. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} --- @@ -3065,7 +3065,7 @@ public java.lang.Object getAllowIpSans(); Flag to allow IP SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} --- @@ -3079,7 +3079,7 @@ public java.lang.Object getAllowLocalhost(); Flag to allow certificates for localhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} --- @@ -3093,7 +3093,7 @@ public java.lang.Object getAllowSubdomains(); Flag to allow certificates matching subdomains. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} --- @@ -3107,7 +3107,7 @@ public java.lang.Object getAllowWildcardCertificates(); Flag to allow wildcard certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} --- @@ -3121,7 +3121,7 @@ public java.lang.Object getBasicConstraintsValidForNonCa(); Flag to mark basic constraints valid when issuing non-CA certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} --- @@ -3135,7 +3135,7 @@ public java.lang.Object getClientFlag(); Flag to specify certificates for client use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} --- @@ -3149,7 +3149,7 @@ public java.lang.Object getCodeSigningFlag(); Flag to specify certificates for code signing use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} --- @@ -3163,7 +3163,7 @@ public java.util.List getCountry(); The country of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} --- @@ -3177,7 +3177,7 @@ public java.lang.Object getEmailProtectionFlag(); Flag to specify certificates for email protection use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} --- @@ -3191,7 +3191,7 @@ public java.lang.Object getEnforceHostnames(); Flag to allow only valid host names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} --- @@ -3205,7 +3205,7 @@ public java.util.List getExtKeyUsage(); Specify the allowed extended key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} --- @@ -3219,7 +3219,7 @@ public java.util.List getExtKeyUsageOids(); A list of extended key usage OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} --- @@ -3233,7 +3233,7 @@ public java.lang.Object getGenerateLease(); Flag to generate leases with certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} --- @@ -3245,7 +3245,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -3262,7 +3262,7 @@ public java.lang.String getIssuerRef(); Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} --- @@ -3276,7 +3276,7 @@ public java.lang.Number getKeyBits(); The number of bits of generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} --- @@ -3290,7 +3290,7 @@ public java.lang.String getKeyType(); The generated key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} --- @@ -3304,7 +3304,7 @@ public java.util.List getKeyUsage(); Specify the allowed key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} --- @@ -3318,7 +3318,7 @@ public java.util.List getLocality(); The locality of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} --- @@ -3332,7 +3332,7 @@ public java.lang.String getMaxTtl(); The maximum TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} --- @@ -3346,7 +3346,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} --- @@ -3360,7 +3360,7 @@ public java.lang.Object getNoStore(); Flag to not store certificates in the storage backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} --- @@ -3374,7 +3374,7 @@ public java.lang.String getNotBeforeDuration(); Specifies the duration by which to backdate the NotBefore property. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} --- @@ -3388,7 +3388,7 @@ public java.util.List getOrganization(); The organization of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} --- @@ -3402,7 +3402,7 @@ public java.util.List getOu(); The organization unit of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} --- @@ -3416,7 +3416,7 @@ public java.lang.Object getPolicyIdentifier(); policy_identifier block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} --- @@ -3430,7 +3430,7 @@ public java.util.List getPolicyIdentifiers(); Specify the list of allowed policies OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} --- @@ -3444,7 +3444,7 @@ public java.util.List getPostalCode(); The postal code of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} --- @@ -3458,7 +3458,7 @@ public java.util.List getProvince(); The province of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} --- @@ -3472,7 +3472,7 @@ public java.lang.Object getRequireCn(); Flag to force CN usage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} --- @@ -3486,7 +3486,7 @@ public java.lang.Object getServerFlag(); Flag to specify certificates for server use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} --- @@ -3500,7 +3500,7 @@ public java.util.List getStreetAddress(); The street address of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} --- @@ -3514,7 +3514,7 @@ public java.lang.String getTtl(); The TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} --- @@ -3528,7 +3528,7 @@ public java.lang.Object getUseCsrCommonName(); Flag to use the CN in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} --- @@ -3542,7 +3542,7 @@ public java.lang.Object getUseCsrSans(); Flag to use the SANs in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} --- @@ -3580,7 +3580,7 @@ public java.lang.String getOid(); OID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} --- @@ -3594,7 +3594,7 @@ public java.lang.String getCps(); Optional CPS URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} --- @@ -3608,7 +3608,7 @@ public java.lang.String getNotice(); Optional notice. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} --- diff --git a/docs/pkiSecretBackendRole.python.md b/docs/pkiSecretBackendRole.python.md index 257769c9..0abfa2d1 100644 --- a/docs/pkiSecretBackendRole.python.md +++ b/docs/pkiSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. #### Initializers @@ -107,7 +107,7 @@ pkiSecretBackendRole.PkiSecretBackendRole( | ext_key_usage | typing.List[str] | Specify the allowed extended key usage constraint on issued certificates. | | ext_key_usage_oids | typing.List[str] | A list of extended key usage OIDs. | | generate_lease | typing.Union[bool, cdktf.IResolvable] | Flag to generate leases with certificates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | | issuer_ref | str | Specifies the default issuer of this request. | | key_bits | typing.Union[int, float] | The number of bits of generated keys. | | key_type | str | The generated key type. | @@ -198,7 +198,7 @@ Must be unique amongst siblings in the same scope The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow any name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow certificates matching the actual domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The domains of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Defines allowed custom SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Defines allowed Subject serial numbers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Defines allowed URI SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} --- @@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The allowed User ID's. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} --- @@ -308,7 +308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow names containing glob patterns. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} --- @@ -318,7 +318,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow IP SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} --- @@ -328,7 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow certificates for localhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} --- @@ -338,7 +338,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow certificates matching subdomains. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} --- @@ -348,7 +348,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow wildcard certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} --- @@ -358,7 +358,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to mark basic constraints valid when issuing non-CA certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} --- @@ -368,7 +368,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to specify certificates for client use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} --- @@ -378,7 +378,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to specify certificates for code signing use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} --- @@ -388,7 +388,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The country of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} --- @@ -398,7 +398,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to specify certificates for email protection use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} --- @@ -408,7 +408,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow only valid host names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} --- @@ -418,7 +418,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specify the allowed extended key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} --- @@ -428,7 +428,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of extended key usage OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} --- @@ -438,7 +438,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to generate leases with certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} --- @@ -446,7 +446,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -459,7 +459,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} --- @@ -469,7 +469,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of bits of generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} --- @@ -479,7 +479,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The generated key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} --- @@ -489,7 +489,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specify the allowed key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} --- @@ -499,7 +499,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The locality of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} --- @@ -509,7 +509,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} --- @@ -519,7 +519,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} --- @@ -529,7 +529,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to not store certificates in the storage backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} --- @@ -539,7 +539,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the duration by which to backdate the NotBefore property. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} --- @@ -549,7 +549,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} --- @@ -559,7 +559,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization unit of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} --- @@ -569,7 +569,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi policy_identifier block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} --- @@ -579,7 +579,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specify the list of allowed policies OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} --- @@ -589,7 +589,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The postal code of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} --- @@ -599,7 +599,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The province of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} --- @@ -609,7 +609,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to force CN usage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} --- @@ -619,7 +619,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to specify certificates for server use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} --- @@ -629,7 +629,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The street address of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} --- @@ -639,7 +639,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} --- @@ -649,7 +649,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to use the CN in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} --- @@ -659,7 +659,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to use the SANs in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} --- @@ -1462,7 +1462,7 @@ The construct id used in the generated config for the PkiSecretBackendRole to im The id of the existing PkiSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2792,7 +2792,7 @@ pkiSecretBackendRole.PkiSecretBackendRoleConfig( | ext_key_usage | typing.List[str] | Specify the allowed extended key usage constraint on issued certificates. | | ext_key_usage_oids | typing.List[str] | A list of extended key usage OIDs. | | generate_lease | typing.Union[bool, cdktf.IResolvable] | Flag to generate leases with certificates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | | issuer_ref | str | Specifies the default issuer of this request. | | key_bits | typing.Union[int, float] | The number of bits of generated keys. | | key_type | str | The generated key type. | @@ -2897,7 +2897,7 @@ backend: str The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} --- @@ -2911,7 +2911,7 @@ name: str Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} --- @@ -2925,7 +2925,7 @@ allow_any_name: typing.Union[bool, IResolvable] Flag to allow any name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} --- @@ -2939,7 +2939,7 @@ allow_bare_domains: typing.Union[bool, IResolvable] Flag to allow certificates matching the actual domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} --- @@ -2953,7 +2953,7 @@ allowed_domains: typing.List[str] The domains of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} --- @@ -2967,7 +2967,7 @@ allowed_domains_template: typing.Union[bool, IResolvable] Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} --- @@ -2981,7 +2981,7 @@ allowed_other_sans: typing.List[str] Defines allowed custom SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} --- @@ -2995,7 +2995,7 @@ allowed_serial_numbers: typing.List[str] Defines allowed Subject serial numbers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} --- @@ -3009,7 +3009,7 @@ allowed_uri_sans: typing.List[str] Defines allowed URI SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} --- @@ -3023,7 +3023,7 @@ allowed_uri_sans_template: typing.Union[bool, IResolvable] Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} --- @@ -3037,7 +3037,7 @@ allowed_user_ids: typing.List[str] The allowed User ID's. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} --- @@ -3051,7 +3051,7 @@ allow_glob_domains: typing.Union[bool, IResolvable] Flag to allow names containing glob patterns. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} --- @@ -3065,7 +3065,7 @@ allow_ip_sans: typing.Union[bool, IResolvable] Flag to allow IP SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} --- @@ -3079,7 +3079,7 @@ allow_localhost: typing.Union[bool, IResolvable] Flag to allow certificates for localhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} --- @@ -3093,7 +3093,7 @@ allow_subdomains: typing.Union[bool, IResolvable] Flag to allow certificates matching subdomains. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} --- @@ -3107,7 +3107,7 @@ allow_wildcard_certificates: typing.Union[bool, IResolvable] Flag to allow wildcard certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} --- @@ -3121,7 +3121,7 @@ basic_constraints_valid_for_non_ca: typing.Union[bool, IResolvable] Flag to mark basic constraints valid when issuing non-CA certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} --- @@ -3135,7 +3135,7 @@ client_flag: typing.Union[bool, IResolvable] Flag to specify certificates for client use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} --- @@ -3149,7 +3149,7 @@ code_signing_flag: typing.Union[bool, IResolvable] Flag to specify certificates for code signing use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} --- @@ -3163,7 +3163,7 @@ country: typing.List[str] The country of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} --- @@ -3177,7 +3177,7 @@ email_protection_flag: typing.Union[bool, IResolvable] Flag to specify certificates for email protection use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} --- @@ -3191,7 +3191,7 @@ enforce_hostnames: typing.Union[bool, IResolvable] Flag to allow only valid host names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} --- @@ -3205,7 +3205,7 @@ ext_key_usage: typing.List[str] Specify the allowed extended key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} --- @@ -3219,7 +3219,7 @@ ext_key_usage_oids: typing.List[str] A list of extended key usage OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} --- @@ -3233,7 +3233,7 @@ generate_lease: typing.Union[bool, IResolvable] Flag to generate leases with certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} --- @@ -3245,7 +3245,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -3262,7 +3262,7 @@ issuer_ref: str Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} --- @@ -3276,7 +3276,7 @@ key_bits: typing.Union[int, float] The number of bits of generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} --- @@ -3290,7 +3290,7 @@ key_type: str The generated key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} --- @@ -3304,7 +3304,7 @@ key_usage: typing.List[str] Specify the allowed key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} --- @@ -3318,7 +3318,7 @@ locality: typing.List[str] The locality of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} --- @@ -3332,7 +3332,7 @@ max_ttl: str The maximum TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} --- @@ -3346,7 +3346,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} --- @@ -3360,7 +3360,7 @@ no_store: typing.Union[bool, IResolvable] Flag to not store certificates in the storage backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} --- @@ -3374,7 +3374,7 @@ not_before_duration: str Specifies the duration by which to backdate the NotBefore property. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} --- @@ -3388,7 +3388,7 @@ organization: typing.List[str] The organization of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} --- @@ -3402,7 +3402,7 @@ ou: typing.List[str] The organization unit of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} --- @@ -3416,7 +3416,7 @@ policy_identifier: typing.Union[IResolvable, typing.List[PkiSecretBackendRolePol policy_identifier block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} --- @@ -3430,7 +3430,7 @@ policy_identifiers: typing.List[str] Specify the list of allowed policies OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} --- @@ -3444,7 +3444,7 @@ postal_code: typing.List[str] The postal code of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} --- @@ -3458,7 +3458,7 @@ province: typing.List[str] The province of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} --- @@ -3472,7 +3472,7 @@ require_cn: typing.Union[bool, IResolvable] Flag to force CN usage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} --- @@ -3486,7 +3486,7 @@ server_flag: typing.Union[bool, IResolvable] Flag to specify certificates for server use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} --- @@ -3500,7 +3500,7 @@ street_address: typing.List[str] The street address of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} --- @@ -3514,7 +3514,7 @@ ttl: str The TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} --- @@ -3528,7 +3528,7 @@ use_csr_common_name: typing.Union[bool, IResolvable] Flag to use the CN in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} --- @@ -3542,7 +3542,7 @@ use_csr_sans: typing.Union[bool, IResolvable] Flag to use the SANs in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} --- @@ -3580,7 +3580,7 @@ oid: str OID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} --- @@ -3594,7 +3594,7 @@ cps: str Optional CPS URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} --- @@ -3608,7 +3608,7 @@ notice: str Optional notice. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} --- diff --git a/docs/pkiSecretBackendRole.typescript.md b/docs/pkiSecretBackendRole.typescript.md index a3bec229..66575e85 100644 --- a/docs/pkiSecretBackendRole.typescript.md +++ b/docs/pkiSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}. #### Initializers @@ -795,7 +795,7 @@ The construct id used in the generated config for the PkiSecretBackendRole to im The id of the existing PkiSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2070,7 +2070,7 @@ const pkiSecretBackendRoleConfig: pkiSecretBackendRole.PkiSecretBackendRoleConfi | extKeyUsage | string[] | Specify the allowed extended key usage constraint on issued certificates. | | extKeyUsageOids | string[] | A list of extended key usage OIDs. | | generateLease | boolean \| cdktf.IResolvable | Flag to generate leases with certificates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. | | issuerRef | string | Specifies the default issuer of this request. | | keyBits | number | The number of bits of generated keys. | | keyType | string | The generated key type. | @@ -2175,7 +2175,7 @@ public readonly backend: string; The path of the PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} --- @@ -2189,7 +2189,7 @@ public readonly name: string; Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} --- @@ -2203,7 +2203,7 @@ public readonly allowAnyName: boolean | IResolvable; Flag to allow any name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} --- @@ -2217,7 +2217,7 @@ public readonly allowBareDomains: boolean | IResolvable; Flag to allow certificates matching the actual domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} --- @@ -2231,7 +2231,7 @@ public readonly allowedDomains: string[]; The domains of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} --- @@ -2245,7 +2245,7 @@ public readonly allowedDomainsTemplate: boolean | IResolvable; Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} --- @@ -2259,7 +2259,7 @@ public readonly allowedOtherSans: string[]; Defines allowed custom SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} --- @@ -2273,7 +2273,7 @@ public readonly allowedSerialNumbers: string[]; Defines allowed Subject serial numbers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} --- @@ -2287,7 +2287,7 @@ public readonly allowedUriSans: string[]; Defines allowed URI SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} --- @@ -2301,7 +2301,7 @@ public readonly allowedUriSansTemplate: boolean | IResolvable; Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases..name}}). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} --- @@ -2315,7 +2315,7 @@ public readonly allowedUserIds: string[]; The allowed User ID's. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} --- @@ -2329,7 +2329,7 @@ public readonly allowGlobDomains: boolean | IResolvable; Flag to allow names containing glob patterns. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} --- @@ -2343,7 +2343,7 @@ public readonly allowIpSans: boolean | IResolvable; Flag to allow IP SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} --- @@ -2357,7 +2357,7 @@ public readonly allowLocalhost: boolean | IResolvable; Flag to allow certificates for localhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} --- @@ -2371,7 +2371,7 @@ public readonly allowSubdomains: boolean | IResolvable; Flag to allow certificates matching subdomains. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} --- @@ -2385,7 +2385,7 @@ public readonly allowWildcardCertificates: boolean | IResolvable; Flag to allow wildcard certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} --- @@ -2399,7 +2399,7 @@ public readonly basicConstraintsValidForNonCa: boolean | IResolvable; Flag to mark basic constraints valid when issuing non-CA certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} --- @@ -2413,7 +2413,7 @@ public readonly clientFlag: boolean | IResolvable; Flag to specify certificates for client use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} --- @@ -2427,7 +2427,7 @@ public readonly codeSigningFlag: boolean | IResolvable; Flag to specify certificates for code signing use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} --- @@ -2441,7 +2441,7 @@ public readonly country: string[]; The country of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} --- @@ -2455,7 +2455,7 @@ public readonly emailProtectionFlag: boolean | IResolvable; Flag to specify certificates for email protection use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} --- @@ -2469,7 +2469,7 @@ public readonly enforceHostnames: boolean | IResolvable; Flag to allow only valid host names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} --- @@ -2483,7 +2483,7 @@ public readonly extKeyUsage: string[]; Specify the allowed extended key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} --- @@ -2497,7 +2497,7 @@ public readonly extKeyUsageOids: string[]; A list of extended key usage OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} --- @@ -2511,7 +2511,7 @@ public readonly generateLease: boolean | IResolvable; Flag to generate leases with certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} --- @@ -2523,7 +2523,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2540,7 +2540,7 @@ public readonly issuerRef: string; Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} --- @@ -2554,7 +2554,7 @@ public readonly keyBits: number; The number of bits of generated keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} --- @@ -2568,7 +2568,7 @@ public readonly keyType: string; The generated key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} --- @@ -2582,7 +2582,7 @@ public readonly keyUsage: string[]; Specify the allowed key usage constraint on issued certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} --- @@ -2596,7 +2596,7 @@ public readonly locality: string[]; The locality of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} --- @@ -2610,7 +2610,7 @@ public readonly maxTtl: string; The maximum TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} --- @@ -2624,7 +2624,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} --- @@ -2638,7 +2638,7 @@ public readonly noStore: boolean | IResolvable; Flag to not store certificates in the storage backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} --- @@ -2652,7 +2652,7 @@ public readonly notBeforeDuration: string; Specifies the duration by which to backdate the NotBefore property. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} --- @@ -2666,7 +2666,7 @@ public readonly organization: string[]; The organization of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} --- @@ -2680,7 +2680,7 @@ public readonly ou: string[]; The organization unit of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} --- @@ -2694,7 +2694,7 @@ public readonly policyIdentifier: IResolvable | PkiSecretBackendRolePolicyIdenti policy_identifier block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} --- @@ -2708,7 +2708,7 @@ public readonly policyIdentifiers: string[]; Specify the list of allowed policies OIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} --- @@ -2722,7 +2722,7 @@ public readonly postalCode: string[]; The postal code of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} --- @@ -2736,7 +2736,7 @@ public readonly province: string[]; The province of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} --- @@ -2750,7 +2750,7 @@ public readonly requireCn: boolean | IResolvable; Flag to force CN usage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} --- @@ -2764,7 +2764,7 @@ public readonly serverFlag: boolean | IResolvable; Flag to specify certificates for server use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} --- @@ -2778,7 +2778,7 @@ public readonly streetAddress: string[]; The street address of generated certificates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} --- @@ -2792,7 +2792,7 @@ public readonly ttl: string; The TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} --- @@ -2806,7 +2806,7 @@ public readonly useCsrCommonName: boolean | IResolvable; Flag to use the CN in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} --- @@ -2820,7 +2820,7 @@ public readonly useCsrSans: boolean | IResolvable; Flag to use the SANs in the CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} --- @@ -2854,7 +2854,7 @@ public readonly oid: string; OID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} --- @@ -2868,7 +2868,7 @@ public readonly cps: string; Optional CPS URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} --- @@ -2882,7 +2882,7 @@ public readonly notice: string; Optional notice. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} --- diff --git a/docs/pkiSecretBackendRootCert.csharp.md b/docs/pkiSecretBackendRootCert.csharp.md index 08d3d8ff..80d5ea38 100644 --- a/docs/pkiSecretBackendRootCert.csharp.md +++ b/docs/pkiSecretBackendRootCert.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRootCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. #### Initializers @@ -649,7 +649,7 @@ The construct id used in the generated config for the PkiSecretBackendRootCert t The id of the existing PkiSecretBackendRootCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use --- @@ -683,7 +683,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | IssuerId | string | *No description.* | | IssuingCa | string | *No description.* | | KeyId | string | *No description.* | -| Serial | string | *No description.* | | SerialNumber | string | *No description.* | | AltNamesInput | string[] | *No description.* | | BackendInput | string | *No description.* | @@ -928,16 +927,6 @@ public string KeyId { get; } --- -##### `Serial`Required - -```csharp -public string Serial { get; } -``` - -- *Type:* string - ---- - ##### `SerialNumber`Required ```csharp @@ -1613,7 +1602,7 @@ new PkiSecretBackendRootCertConfig { | Country | string | The country. | | ExcludeCnFromSans | object | Flag to exclude CN from SANs. | | Format | string | The format of data. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | | IpSans | string[] | List of alternative IPs. | | IssuerName | string | Provides a name to the specified issuer. | | KeyBits | double | The number of bits to use. | @@ -1718,7 +1707,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} --- @@ -1732,7 +1721,7 @@ public string CommonName { get; set; } CN of root to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} --- @@ -1746,7 +1735,7 @@ public string Type { get; set; } Type of root to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} --- @@ -1760,7 +1749,7 @@ public string[] AltNames { get; set; } List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} --- @@ -1774,7 +1763,7 @@ public string Country { get; set; } The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} --- @@ -1788,7 +1777,7 @@ public object ExcludeCnFromSans { get; set; } Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} --- @@ -1802,7 +1791,7 @@ public string Format { get; set; } The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} --- @@ -1814,7 +1803,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1831,7 +1820,7 @@ public string[] IpSans { get; set; } List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} --- @@ -1847,7 +1836,7 @@ Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} --- @@ -1861,7 +1850,7 @@ public double KeyBits { get; set; } The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} --- @@ -1875,7 +1864,7 @@ public string KeyName { get; set; } When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} --- @@ -1889,7 +1878,7 @@ public string KeyRef { get; set; } Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} --- @@ -1903,7 +1892,7 @@ public string KeyType { get; set; } The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} --- @@ -1917,7 +1906,7 @@ public string Locality { get; set; } The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} --- @@ -1931,7 +1920,7 @@ public string ManagedKeyId { get; set; } The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} --- @@ -1945,7 +1934,7 @@ public string ManagedKeyName { get; set; } The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} --- @@ -1959,7 +1948,7 @@ public double MaxPathLength { get; set; } The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} --- @@ -1973,7 +1962,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} --- @@ -1987,7 +1976,7 @@ public string Organization { get; set; } The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} --- @@ -2001,7 +1990,7 @@ public string[] OtherSans { get; set; } List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} --- @@ -2015,7 +2004,7 @@ public string Ou { get; set; } The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} --- @@ -2029,7 +2018,7 @@ public string[] PermittedDnsDomains { get; set; } List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} --- @@ -2043,7 +2032,7 @@ public string PostalCode { get; set; } The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} --- @@ -2057,7 +2046,7 @@ public string PrivateKeyFormat { get; set; } The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} --- @@ -2071,7 +2060,7 @@ public string Province { get; set; } The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} --- @@ -2085,7 +2074,7 @@ public string StreetAddress { get; set; } The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} --- @@ -2099,7 +2088,7 @@ public string Ttl { get; set; } Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} --- @@ -2113,7 +2102,7 @@ public string[] UriSans { get; set; } List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} --- diff --git a/docs/pkiSecretBackendRootCert.go.md b/docs/pkiSecretBackendRootCert.go.md index a36de0c7..c8cc085e 100644 --- a/docs/pkiSecretBackendRootCert.go.md +++ b/docs/pkiSecretBackendRootCert.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendRootCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootcert" pkisecretbackendrootcert.NewPkiSecretBackendRootCert(scope Construct, id *string, config PkiSecretBackendRootCertConfig) PkiSecretBackendRootCert ``` @@ -560,7 +560,7 @@ func ResetUriSans() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootcert" pkisecretbackendrootcert.PkiSecretBackendRootCert_IsConstruct(x interface{}) *bool ``` @@ -592,7 +592,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootcert" pkisecretbackendrootcert.PkiSecretBackendRootCert_IsTerraformElement(x interface{}) *bool ``` @@ -606,7 +606,7 @@ pkisecretbackendrootcert.PkiSecretBackendRootCert_IsTerraformElement(x interface ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootcert" pkisecretbackendrootcert.PkiSecretBackendRootCert_IsTerraformResource(x interface{}) *bool ``` @@ -620,7 +620,7 @@ pkisecretbackendrootcert.PkiSecretBackendRootCert_IsTerraformResource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootcert" pkisecretbackendrootcert.PkiSecretBackendRootCert_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -649,7 +649,7 @@ The construct id used in the generated config for the PkiSecretBackendRootCert t The id of the existing PkiSecretBackendRootCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use --- @@ -683,7 +683,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | IssuerId | *string | *No description.* | | IssuingCa | *string | *No description.* | | KeyId | *string | *No description.* | -| Serial | *string | *No description.* | | SerialNumber | *string | *No description.* | | AltNamesInput | *[]*string | *No description.* | | BackendInput | *string | *No description.* | @@ -928,16 +927,6 @@ func KeyId() *string --- -##### `Serial`Required - -```go -func Serial() *string -``` - -- *Type:* *string - ---- - ##### `SerialNumber`Required ```go @@ -1553,7 +1542,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootcert" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootcert" &pkisecretbackendrootcert.PkiSecretBackendRootCertConfig { Connection: interface{}, @@ -1613,7 +1602,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootc | Country | *string | The country. | | ExcludeCnFromSans | interface{} | Flag to exclude CN from SANs. | | Format | *string | The format of data. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | | IpSans | *[]*string | List of alternative IPs. | | IssuerName | *string | Provides a name to the specified issuer. | | KeyBits | *f64 | The number of bits to use. | @@ -1718,7 +1707,7 @@ Backend *string The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} --- @@ -1732,7 +1721,7 @@ CommonName *string CN of root to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} --- @@ -1746,7 +1735,7 @@ Type *string Type of root to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} --- @@ -1760,7 +1749,7 @@ AltNames *[]*string List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} --- @@ -1774,7 +1763,7 @@ Country *string The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} --- @@ -1788,7 +1777,7 @@ ExcludeCnFromSans interface{} Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} --- @@ -1802,7 +1791,7 @@ Format *string The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} --- @@ -1814,7 +1803,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1831,7 +1820,7 @@ IpSans *[]*string List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} --- @@ -1847,7 +1836,7 @@ Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} --- @@ -1861,7 +1850,7 @@ KeyBits *f64 The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} --- @@ -1875,7 +1864,7 @@ KeyName *string When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} --- @@ -1889,7 +1878,7 @@ KeyRef *string Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} --- @@ -1903,7 +1892,7 @@ KeyType *string The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} --- @@ -1917,7 +1906,7 @@ Locality *string The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} --- @@ -1931,7 +1920,7 @@ ManagedKeyId *string The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} --- @@ -1945,7 +1934,7 @@ ManagedKeyName *string The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} --- @@ -1959,7 +1948,7 @@ MaxPathLength *f64 The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} --- @@ -1973,7 +1962,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} --- @@ -1987,7 +1976,7 @@ Organization *string The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} --- @@ -2001,7 +1990,7 @@ OtherSans *[]*string List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} --- @@ -2015,7 +2004,7 @@ Ou *string The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} --- @@ -2029,7 +2018,7 @@ PermittedDnsDomains *[]*string List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} --- @@ -2043,7 +2032,7 @@ PostalCode *string The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} --- @@ -2057,7 +2046,7 @@ PrivateKeyFormat *string The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} --- @@ -2071,7 +2060,7 @@ Province *string The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} --- @@ -2085,7 +2074,7 @@ StreetAddress *string The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} --- @@ -2099,7 +2088,7 @@ Ttl *string Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} --- @@ -2113,7 +2102,7 @@ UriSans *[]*string List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} --- diff --git a/docs/pkiSecretBackendRootCert.java.md b/docs/pkiSecretBackendRootCert.java.md index 43d54b21..7aa18b49 100644 --- a/docs/pkiSecretBackendRootCert.java.md +++ b/docs/pkiSecretBackendRootCert.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRootCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. #### Initializers @@ -74,7 +74,7 @@ PkiSecretBackendRootCert.Builder.create(Construct scope, java.lang.String id) | country | java.lang.String | The country. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerName | java.lang.String | Provides a name to the specified issuer. | | keyBits | java.lang.Number | The number of bits to use. | @@ -165,7 +165,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of root to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of root to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -246,7 +246,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} --- @@ -258,7 +258,7 @@ Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} --- @@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} --- @@ -308,7 +308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} --- @@ -318,7 +318,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} --- @@ -328,7 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} --- @@ -338,7 +338,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} --- @@ -348,7 +348,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} --- @@ -358,7 +358,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} --- @@ -368,7 +368,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} --- @@ -378,7 +378,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} --- @@ -388,7 +388,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} --- @@ -398,7 +398,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} --- @@ -408,7 +408,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} --- @@ -418,7 +418,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} --- @@ -428,7 +428,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} --- @@ -438,7 +438,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} --- @@ -448,7 +448,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} --- @@ -1057,7 +1057,7 @@ The construct id used in the generated config for the PkiSecretBackendRootCert t The id of the existing PkiSecretBackendRootCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use --- @@ -1091,7 +1091,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | issuerId | java.lang.String | *No description.* | | issuingCa | java.lang.String | *No description.* | | keyId | java.lang.String | *No description.* | -| serial | java.lang.String | *No description.* | | serialNumber | java.lang.String | *No description.* | | altNamesInput | java.util.List | *No description.* | | backendInput | java.lang.String | *No description.* | @@ -1336,16 +1335,6 @@ public java.lang.String getKeyId(); --- -##### `serial`Required - -```java -public java.lang.String getSerial(); -``` - -- *Type:* java.lang.String - ---- - ##### `serialNumber`Required ```java @@ -2026,7 +2015,7 @@ PkiSecretBackendRootCertConfig.builder() | country | java.lang.String | The country. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerName | java.lang.String | Provides a name to the specified issuer. | | keyBits | java.lang.Number | The number of bits to use. | @@ -2131,7 +2120,7 @@ public java.lang.String getBackend(); The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} --- @@ -2145,7 +2134,7 @@ public java.lang.String getCommonName(); CN of root to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} --- @@ -2159,7 +2148,7 @@ public java.lang.String getType(); Type of root to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} --- @@ -2173,7 +2162,7 @@ public java.util.List getAltNames(); List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} --- @@ -2187,7 +2176,7 @@ public java.lang.String getCountry(); The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} --- @@ -2201,7 +2190,7 @@ public java.lang.Object getExcludeCnFromSans(); Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} --- @@ -2215,7 +2204,7 @@ public java.lang.String getFormat(); The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} --- @@ -2227,7 +2216,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2244,7 +2233,7 @@ public java.util.List getIpSans(); List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} --- @@ -2260,7 +2249,7 @@ Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} --- @@ -2274,7 +2263,7 @@ public java.lang.Number getKeyBits(); The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} --- @@ -2288,7 +2277,7 @@ public java.lang.String getKeyName(); When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} --- @@ -2302,7 +2291,7 @@ public java.lang.String getKeyRef(); Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} --- @@ -2316,7 +2305,7 @@ public java.lang.String getKeyType(); The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} --- @@ -2330,7 +2319,7 @@ public java.lang.String getLocality(); The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} --- @@ -2344,7 +2333,7 @@ public java.lang.String getManagedKeyId(); The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} --- @@ -2358,7 +2347,7 @@ public java.lang.String getManagedKeyName(); The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} --- @@ -2372,7 +2361,7 @@ public java.lang.Number getMaxPathLength(); The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} --- @@ -2386,7 +2375,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} --- @@ -2400,7 +2389,7 @@ public java.lang.String getOrganization(); The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} --- @@ -2414,7 +2403,7 @@ public java.util.List getOtherSans(); List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} --- @@ -2428,7 +2417,7 @@ public java.lang.String getOu(); The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} --- @@ -2442,7 +2431,7 @@ public java.util.List getPermittedDnsDomains(); List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} --- @@ -2456,7 +2445,7 @@ public java.lang.String getPostalCode(); The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} --- @@ -2470,7 +2459,7 @@ public java.lang.String getPrivateKeyFormat(); The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} --- @@ -2484,7 +2473,7 @@ public java.lang.String getProvince(); The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} --- @@ -2498,7 +2487,7 @@ public java.lang.String getStreetAddress(); The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} --- @@ -2512,7 +2501,7 @@ public java.lang.String getTtl(); Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} --- @@ -2526,7 +2515,7 @@ public java.util.List getUriSans(); List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} --- diff --git a/docs/pkiSecretBackendRootCert.python.md b/docs/pkiSecretBackendRootCert.python.md index 6bb008df..e0f07338 100644 --- a/docs/pkiSecretBackendRootCert.python.md +++ b/docs/pkiSecretBackendRootCert.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRootCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. #### Initializers @@ -71,7 +71,7 @@ pkiSecretBackendRootCert.PkiSecretBackendRootCert( | country | str | The country. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_name | str | Provides a name to the specified issuer. | | key_bits | typing.Union[int, float] | The number of bits to use. | @@ -162,7 +162,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of root to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of root to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} --- @@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -243,7 +243,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} --- @@ -255,7 +255,7 @@ Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} --- @@ -305,7 +305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} --- @@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} --- @@ -325,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} --- @@ -335,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} --- @@ -345,7 +345,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} --- @@ -355,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} --- @@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} --- @@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} --- @@ -385,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} --- @@ -395,7 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} --- @@ -405,7 +405,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} --- @@ -415,7 +415,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} --- @@ -425,7 +425,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} --- @@ -435,7 +435,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} --- @@ -445,7 +445,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} --- @@ -1100,7 +1100,7 @@ The construct id used in the generated config for the PkiSecretBackendRootCert t The id of the existing PkiSecretBackendRootCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use --- @@ -1134,7 +1134,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | issuer_id | str | *No description.* | | issuing_ca | str | *No description.* | | key_id | str | *No description.* | -| serial | str | *No description.* | | serial_number | str | *No description.* | | alt_names_input | typing.List[str] | *No description.* | | backend_input | str | *No description.* | @@ -1379,16 +1378,6 @@ key_id: str --- -##### `serial`Required - -```python -serial: str -``` - -- *Type:* str - ---- - ##### `serial_number`Required ```python @@ -2064,7 +2053,7 @@ pkiSecretBackendRootCert.PkiSecretBackendRootCertConfig( | country | str | The country. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_name | str | Provides a name to the specified issuer. | | key_bits | typing.Union[int, float] | The number of bits to use. | @@ -2169,7 +2158,7 @@ backend: str The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} --- @@ -2183,7 +2172,7 @@ common_name: str CN of root to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} --- @@ -2197,7 +2186,7 @@ type: str Type of root to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} --- @@ -2211,7 +2200,7 @@ alt_names: typing.List[str] List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} --- @@ -2225,7 +2214,7 @@ country: str The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} --- @@ -2239,7 +2228,7 @@ exclude_cn_from_sans: typing.Union[bool, IResolvable] Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} --- @@ -2253,7 +2242,7 @@ format: str The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} --- @@ -2265,7 +2254,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2282,7 +2271,7 @@ ip_sans: typing.List[str] List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} --- @@ -2298,7 +2287,7 @@ Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} --- @@ -2312,7 +2301,7 @@ key_bits: typing.Union[int, float] The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} --- @@ -2326,7 +2315,7 @@ key_name: str When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} --- @@ -2340,7 +2329,7 @@ key_ref: str Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} --- @@ -2354,7 +2343,7 @@ key_type: str The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} --- @@ -2368,7 +2357,7 @@ locality: str The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} --- @@ -2382,7 +2371,7 @@ managed_key_id: str The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} --- @@ -2396,7 +2385,7 @@ managed_key_name: str The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} --- @@ -2410,7 +2399,7 @@ max_path_length: typing.Union[int, float] The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} --- @@ -2424,7 +2413,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} --- @@ -2438,7 +2427,7 @@ organization: str The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} --- @@ -2452,7 +2441,7 @@ other_sans: typing.List[str] List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} --- @@ -2466,7 +2455,7 @@ ou: str The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} --- @@ -2480,7 +2469,7 @@ permitted_dns_domains: typing.List[str] List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} --- @@ -2494,7 +2483,7 @@ postal_code: str The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} --- @@ -2508,7 +2497,7 @@ private_key_format: str The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} --- @@ -2522,7 +2511,7 @@ province: str The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} --- @@ -2536,7 +2525,7 @@ street_address: str The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} --- @@ -2550,7 +2539,7 @@ ttl: str Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} --- @@ -2564,7 +2553,7 @@ uri_sans: typing.List[str] List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} --- diff --git a/docs/pkiSecretBackendRootCert.typescript.md b/docs/pkiSecretBackendRootCert.typescript.md index 9c5ad914..655184a4 100644 --- a/docs/pkiSecretBackendRootCert.typescript.md +++ b/docs/pkiSecretBackendRootCert.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRootCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert}. #### Initializers @@ -649,7 +649,7 @@ The construct id used in the generated config for the PkiSecretBackendRootCert t The id of the existing PkiSecretBackendRootCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use --- @@ -683,7 +683,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | issuerId | string | *No description.* | | issuingCa | string | *No description.* | | keyId | string | *No description.* | -| serial | string | *No description.* | | serialNumber | string | *No description.* | | altNamesInput | string[] | *No description.* | | backendInput | string | *No description.* | @@ -928,16 +927,6 @@ public readonly keyId: string; --- -##### `serial`Required - -```typescript -public readonly serial: string; -``` - -- *Type:* string - ---- - ##### `serialNumber`Required ```typescript @@ -1576,7 +1565,7 @@ const pkiSecretBackendRootCertConfig: pkiSecretBackendRootCert.PkiSecretBackendR | country | string | The country. | | excludeCnFromSans | boolean \| cdktf.IResolvable | Flag to exclude CN from SANs. | | format | string | The format of data. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. | | ipSans | string[] | List of alternative IPs. | | issuerName | string | Provides a name to the specified issuer. | | keyBits | number | The number of bits to use. | @@ -1681,7 +1670,7 @@ public readonly backend: string; The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} --- @@ -1695,7 +1684,7 @@ public readonly commonName: string; CN of root to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} --- @@ -1709,7 +1698,7 @@ public readonly type: string; Type of root to create. Must be either "existing", "exported", "internal" or "kms". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} --- @@ -1723,7 +1712,7 @@ public readonly altNames: string[]; List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} --- @@ -1737,7 +1726,7 @@ public readonly country: string; The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} --- @@ -1751,7 +1740,7 @@ public readonly excludeCnFromSans: boolean | IResolvable; Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} --- @@ -1765,7 +1754,7 @@ public readonly format: string; The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} --- @@ -1777,7 +1766,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1794,7 +1783,7 @@ public readonly ipSans: string[]; List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} --- @@ -1810,7 +1799,7 @@ Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} --- @@ -1824,7 +1813,7 @@ public readonly keyBits: number; The number of bits to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} --- @@ -1838,7 +1827,7 @@ public readonly keyName: string; When a new key is created with this request, optionally specifies the name for this. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} --- @@ -1852,7 +1841,7 @@ public readonly keyRef: string; Specifies the key to use for generating this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} --- @@ -1866,7 +1855,7 @@ public readonly keyType: string; The desired key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} --- @@ -1880,7 +1869,7 @@ public readonly locality: string; The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} --- @@ -1894,7 +1883,7 @@ public readonly managedKeyId: string; The ID of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} --- @@ -1908,7 +1897,7 @@ public readonly managedKeyName: string; The name of the previously configured managed key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} --- @@ -1922,7 +1911,7 @@ public readonly maxPathLength: number; The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} --- @@ -1936,7 +1925,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} --- @@ -1950,7 +1939,7 @@ public readonly organization: string; The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} --- @@ -1964,7 +1953,7 @@ public readonly otherSans: string[]; List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} --- @@ -1978,7 +1967,7 @@ public readonly ou: string; The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} --- @@ -1992,7 +1981,7 @@ public readonly permittedDnsDomains: string[]; List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} --- @@ -2006,7 +1995,7 @@ public readonly postalCode: string; The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} --- @@ -2020,7 +2009,7 @@ public readonly privateKeyFormat: string; The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} --- @@ -2034,7 +2023,7 @@ public readonly province: string; The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} --- @@ -2048,7 +2037,7 @@ public readonly streetAddress: string; The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} --- @@ -2062,7 +2051,7 @@ public readonly ttl: string; Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} --- @@ -2076,7 +2065,7 @@ public readonly uriSans: string[]; List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} --- diff --git a/docs/pkiSecretBackendRootSignIntermediate.csharp.md b/docs/pkiSecretBackendRootSignIntermediate.csharp.md index 2de8e46f..296331a5 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.csharp.md +++ b/docs/pkiSecretBackendRootSignIntermediate.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRootSignIntermediate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. #### Initializers @@ -614,7 +614,7 @@ The construct id used in the generated config for the PkiSecretBackendRootSignIn The id of the existing PkiSecretBackendRootSignIntermediate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use --- @@ -648,7 +648,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Certificate | string | *No description.* | | CertificateBundle | string | *No description.* | | IssuingCa | string | *No description.* | -| Serial | string | *No description.* | | SerialNumber | string | *No description.* | | AltNamesInput | string[] | *No description.* | | BackendInput | string | *No description.* | @@ -883,16 +882,6 @@ public string IssuingCa { get; } --- -##### `Serial`Required - -```csharp -public string Serial { get; } -``` - -- *Type:* string - ---- - ##### `SerialNumber`Required ```csharp @@ -1463,7 +1452,7 @@ new PkiSecretBackendRootSignIntermediateConfig { | Country | string | The country. | | ExcludeCnFromSans | object | Flag to exclude CN from SANs. | | Format | string | The format of data. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | | IpSans | string[] | List of alternative IPs. | | IssuerRef | string | Specifies the default issuer of this request. | | Locality | string | The locality. | @@ -1563,7 +1552,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} --- @@ -1577,7 +1566,7 @@ public string CommonName { get; set; } CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} --- @@ -1591,7 +1580,7 @@ public string Csr { get; set; } The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} --- @@ -1605,7 +1594,7 @@ public string[] AltNames { get; set; } List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} --- @@ -1619,7 +1608,7 @@ public string Country { get; set; } The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} --- @@ -1633,7 +1622,7 @@ public object ExcludeCnFromSans { get; set; } Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} --- @@ -1647,7 +1636,7 @@ public string Format { get; set; } The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} --- @@ -1659,7 +1648,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1676,7 +1665,7 @@ public string[] IpSans { get; set; } List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} --- @@ -1690,7 +1679,7 @@ public string IssuerRef { get; set; } Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} --- @@ -1704,7 +1693,7 @@ public string Locality { get; set; } The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} --- @@ -1718,7 +1707,7 @@ public double MaxPathLength { get; set; } The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} --- @@ -1732,7 +1721,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} --- @@ -1746,7 +1735,7 @@ public string Organization { get; set; } The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} --- @@ -1760,7 +1749,7 @@ public string[] OtherSans { get; set; } List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} --- @@ -1774,7 +1763,7 @@ public string Ou { get; set; } The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} --- @@ -1788,7 +1777,7 @@ public string[] PermittedDnsDomains { get; set; } List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} --- @@ -1802,7 +1791,7 @@ public string PostalCode { get; set; } The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} --- @@ -1816,7 +1805,7 @@ public string Province { get; set; } The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} --- @@ -1830,7 +1819,7 @@ public object Revoke { get; set; } Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} --- @@ -1844,7 +1833,7 @@ public string StreetAddress { get; set; } The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} --- @@ -1858,7 +1847,7 @@ public string Ttl { get; set; } Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} --- @@ -1872,7 +1861,7 @@ public string[] UriSans { get; set; } List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} --- @@ -1886,7 +1875,7 @@ public object UseCsrValues { get; set; } Preserve CSR values. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} --- diff --git a/docs/pkiSecretBackendRootSignIntermediate.go.md b/docs/pkiSecretBackendRootSignIntermediate.go.md index aa57bcae..53d0f924 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.go.md +++ b/docs/pkiSecretBackendRootSignIntermediate.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendRootSignIntermediate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.NewPkiSecretBackendRootSignIntermediate(scope Construct, id *string, config PkiSecretBackendRootSignIntermediateConfig) PkiSecretBackendRootSignIntermediate ``` @@ -525,7 +525,7 @@ func ResetUseCsrValues() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsConstruct(x interface{}) *bool ``` @@ -557,7 +557,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsTerraformElement(x interface{}) *bool ``` @@ -571,7 +571,7 @@ pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsTerr ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsTerraformResource(x interface{}) *bool ``` @@ -585,7 +585,7 @@ pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_IsTerr ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootsignintermediate" pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediate_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -614,7 +614,7 @@ The construct id used in the generated config for the PkiSecretBackendRootSignIn The id of the existing PkiSecretBackendRootSignIntermediate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use --- @@ -648,7 +648,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Certificate | *string | *No description.* | | CertificateBundle | *string | *No description.* | | IssuingCa | *string | *No description.* | -| Serial | *string | *No description.* | | SerialNumber | *string | *No description.* | | AltNamesInput | *[]*string | *No description.* | | BackendInput | *string | *No description.* | @@ -883,16 +882,6 @@ func IssuingCa() *string --- -##### `Serial`Required - -```go -func Serial() *string -``` - -- *Type:* *string - ---- - ##### `SerialNumber`Required ```go @@ -1408,7 +1397,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendrootsignintermediate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendrootsignintermediate" &pkisecretbackendrootsignintermediate.PkiSecretBackendRootSignIntermediateConfig { Connection: interface{}, @@ -1463,7 +1452,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendroots | Country | *string | The country. | | ExcludeCnFromSans | interface{} | Flag to exclude CN from SANs. | | Format | *string | The format of data. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | | IpSans | *[]*string | List of alternative IPs. | | IssuerRef | *string | Specifies the default issuer of this request. | | Locality | *string | The locality. | @@ -1563,7 +1552,7 @@ Backend *string The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} --- @@ -1577,7 +1566,7 @@ CommonName *string CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} --- @@ -1591,7 +1580,7 @@ Csr *string The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} --- @@ -1605,7 +1594,7 @@ AltNames *[]*string List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} --- @@ -1619,7 +1608,7 @@ Country *string The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} --- @@ -1633,7 +1622,7 @@ ExcludeCnFromSans interface{} Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} --- @@ -1647,7 +1636,7 @@ Format *string The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} --- @@ -1659,7 +1648,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1676,7 +1665,7 @@ IpSans *[]*string List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} --- @@ -1690,7 +1679,7 @@ IssuerRef *string Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} --- @@ -1704,7 +1693,7 @@ Locality *string The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} --- @@ -1718,7 +1707,7 @@ MaxPathLength *f64 The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} --- @@ -1732,7 +1721,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} --- @@ -1746,7 +1735,7 @@ Organization *string The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} --- @@ -1760,7 +1749,7 @@ OtherSans *[]*string List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} --- @@ -1774,7 +1763,7 @@ Ou *string The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} --- @@ -1788,7 +1777,7 @@ PermittedDnsDomains *[]*string List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} --- @@ -1802,7 +1791,7 @@ PostalCode *string The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} --- @@ -1816,7 +1805,7 @@ Province *string The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} --- @@ -1830,7 +1819,7 @@ Revoke interface{} Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} --- @@ -1844,7 +1833,7 @@ StreetAddress *string The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} --- @@ -1858,7 +1847,7 @@ Ttl *string Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} --- @@ -1872,7 +1861,7 @@ UriSans *[]*string List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} --- @@ -1886,7 +1875,7 @@ UseCsrValues interface{} Preserve CSR values. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} --- diff --git a/docs/pkiSecretBackendRootSignIntermediate.java.md b/docs/pkiSecretBackendRootSignIntermediate.java.md index f9d508b4..72c51e61 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.java.md +++ b/docs/pkiSecretBackendRootSignIntermediate.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRootSignIntermediate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. #### Initializers @@ -71,7 +71,7 @@ PkiSecretBackendRootSignIntermediate.Builder.create(Construct scope, java.lang.S | country | java.lang.String | The country. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | locality | java.lang.String | The locality. | @@ -157,7 +157,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -238,7 +238,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} --- @@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} --- @@ -308,7 +308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} --- @@ -318,7 +318,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} --- @@ -328,7 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} --- @@ -338,7 +338,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} --- @@ -348,7 +348,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} --- @@ -358,7 +358,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} --- @@ -368,7 +368,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} --- @@ -378,7 +378,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} --- @@ -388,7 +388,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Preserve CSR values. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} --- @@ -962,7 +962,7 @@ The construct id used in the generated config for the PkiSecretBackendRootSignIn The id of the existing PkiSecretBackendRootSignIntermediate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use --- @@ -996,7 +996,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | certificate | java.lang.String | *No description.* | | certificateBundle | java.lang.String | *No description.* | | issuingCa | java.lang.String | *No description.* | -| serial | java.lang.String | *No description.* | | serialNumber | java.lang.String | *No description.* | | altNamesInput | java.util.List | *No description.* | | backendInput | java.lang.String | *No description.* | @@ -1231,16 +1230,6 @@ public java.lang.String getIssuingCa(); --- -##### `serial`Required - -```java -public java.lang.String getSerial(); -``` - -- *Type:* java.lang.String - ---- - ##### `serialNumber`Required ```java @@ -1818,7 +1807,7 @@ PkiSecretBackendRootSignIntermediateConfig.builder() | country | java.lang.String | The country. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | locality | java.lang.String | The locality. | @@ -1918,7 +1907,7 @@ public java.lang.String getBackend(); The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} --- @@ -1932,7 +1921,7 @@ public java.lang.String getCommonName(); CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} --- @@ -1946,7 +1935,7 @@ public java.lang.String getCsr(); The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} --- @@ -1960,7 +1949,7 @@ public java.util.List getAltNames(); List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} --- @@ -1974,7 +1963,7 @@ public java.lang.String getCountry(); The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} --- @@ -1988,7 +1977,7 @@ public java.lang.Object getExcludeCnFromSans(); Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} --- @@ -2002,7 +1991,7 @@ public java.lang.String getFormat(); The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} --- @@ -2014,7 +2003,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2031,7 +2020,7 @@ public java.util.List getIpSans(); List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} --- @@ -2045,7 +2034,7 @@ public java.lang.String getIssuerRef(); Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} --- @@ -2059,7 +2048,7 @@ public java.lang.String getLocality(); The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} --- @@ -2073,7 +2062,7 @@ public java.lang.Number getMaxPathLength(); The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} --- @@ -2087,7 +2076,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} --- @@ -2101,7 +2090,7 @@ public java.lang.String getOrganization(); The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} --- @@ -2115,7 +2104,7 @@ public java.util.List getOtherSans(); List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} --- @@ -2129,7 +2118,7 @@ public java.lang.String getOu(); The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} --- @@ -2143,7 +2132,7 @@ public java.util.List getPermittedDnsDomains(); List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} --- @@ -2157,7 +2146,7 @@ public java.lang.String getPostalCode(); The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} --- @@ -2171,7 +2160,7 @@ public java.lang.String getProvince(); The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} --- @@ -2185,7 +2174,7 @@ public java.lang.Object getRevoke(); Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} --- @@ -2199,7 +2188,7 @@ public java.lang.String getStreetAddress(); The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} --- @@ -2213,7 +2202,7 @@ public java.lang.String getTtl(); Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} --- @@ -2227,7 +2216,7 @@ public java.util.List getUriSans(); List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} --- @@ -2241,7 +2230,7 @@ public java.lang.Object getUseCsrValues(); Preserve CSR values. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} --- diff --git a/docs/pkiSecretBackendRootSignIntermediate.python.md b/docs/pkiSecretBackendRootSignIntermediate.python.md index 2cb3e331..0d0e163d 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.python.md +++ b/docs/pkiSecretBackendRootSignIntermediate.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRootSignIntermediate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. #### Initializers @@ -66,7 +66,7 @@ pkiSecretBackendRootSignIntermediate.PkiSecretBackendRootSignIntermediate( | country | str | The country. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_ref | str | Specifies the default issuer of this request. | | locality | str | The locality. | @@ -152,7 +152,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -233,7 +233,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} --- @@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} --- @@ -333,7 +333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} --- @@ -343,7 +343,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} --- @@ -353,7 +353,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} --- @@ -363,7 +363,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} --- @@ -373,7 +373,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} --- @@ -383,7 +383,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Preserve CSR values. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} --- @@ -1003,7 +1003,7 @@ The construct id used in the generated config for the PkiSecretBackendRootSignIn The id of the existing PkiSecretBackendRootSignIntermediate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use --- @@ -1037,7 +1037,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | certificate | str | *No description.* | | certificate_bundle | str | *No description.* | | issuing_ca | str | *No description.* | -| serial | str | *No description.* | | serial_number | str | *No description.* | | alt_names_input | typing.List[str] | *No description.* | | backend_input | str | *No description.* | @@ -1272,16 +1271,6 @@ issuing_ca: str --- -##### `serial`Required - -```python -serial: str -``` - -- *Type:* str - ---- - ##### `serial_number`Required ```python @@ -1852,7 +1841,7 @@ pkiSecretBackendRootSignIntermediate.PkiSecretBackendRootSignIntermediateConfig( | country | str | The country. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_ref | str | Specifies the default issuer of this request. | | locality | str | The locality. | @@ -1952,7 +1941,7 @@ backend: str The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} --- @@ -1966,7 +1955,7 @@ common_name: str CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} --- @@ -1980,7 +1969,7 @@ csr: str The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} --- @@ -1994,7 +1983,7 @@ alt_names: typing.List[str] List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} --- @@ -2008,7 +1997,7 @@ country: str The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} --- @@ -2022,7 +2011,7 @@ exclude_cn_from_sans: typing.Union[bool, IResolvable] Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} --- @@ -2036,7 +2025,7 @@ format: str The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} --- @@ -2048,7 +2037,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2065,7 +2054,7 @@ ip_sans: typing.List[str] List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} --- @@ -2079,7 +2068,7 @@ issuer_ref: str Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} --- @@ -2093,7 +2082,7 @@ locality: str The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} --- @@ -2107,7 +2096,7 @@ max_path_length: typing.Union[int, float] The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} --- @@ -2121,7 +2110,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} --- @@ -2135,7 +2124,7 @@ organization: str The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} --- @@ -2149,7 +2138,7 @@ other_sans: typing.List[str] List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} --- @@ -2163,7 +2152,7 @@ ou: str The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} --- @@ -2177,7 +2166,7 @@ permitted_dns_domains: typing.List[str] List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} --- @@ -2191,7 +2180,7 @@ postal_code: str The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} --- @@ -2205,7 +2194,7 @@ province: str The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} --- @@ -2219,7 +2208,7 @@ revoke: typing.Union[bool, IResolvable] Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} --- @@ -2233,7 +2222,7 @@ street_address: str The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} --- @@ -2247,7 +2236,7 @@ ttl: str Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} --- @@ -2261,7 +2250,7 @@ uri_sans: typing.List[str] List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} --- @@ -2275,7 +2264,7 @@ use_csr_values: typing.Union[bool, IResolvable] Preserve CSR values. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} --- diff --git a/docs/pkiSecretBackendRootSignIntermediate.typescript.md b/docs/pkiSecretBackendRootSignIntermediate.typescript.md index 168b6708..6ca5185e 100644 --- a/docs/pkiSecretBackendRootSignIntermediate.typescript.md +++ b/docs/pkiSecretBackendRootSignIntermediate.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendRootSignIntermediate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate}. #### Initializers @@ -614,7 +614,7 @@ The construct id used in the generated config for the PkiSecretBackendRootSignIn The id of the existing PkiSecretBackendRootSignIntermediate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use --- @@ -648,7 +648,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | certificate | string | *No description.* | | certificateBundle | string | *No description.* | | issuingCa | string | *No description.* | -| serial | string | *No description.* | | serialNumber | string | *No description.* | | altNamesInput | string[] | *No description.* | | backendInput | string | *No description.* | @@ -883,16 +882,6 @@ public readonly issuingCa: string; --- -##### `serial`Required - -```typescript -public readonly serial: string; -``` - -- *Type:* string - ---- - ##### `serialNumber`Required ```typescript @@ -1431,7 +1420,7 @@ const pkiSecretBackendRootSignIntermediateConfig: pkiSecretBackendRootSignInterm | country | string | The country. | | excludeCnFromSans | boolean \| cdktf.IResolvable | Flag to exclude CN from SANs. | | format | string | The format of data. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. | | ipSans | string[] | List of alternative IPs. | | issuerRef | string | Specifies the default issuer of this request. | | locality | string | The locality. | @@ -1531,7 +1520,7 @@ public readonly backend: string; The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} --- @@ -1545,7 +1534,7 @@ public readonly commonName: string; CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} --- @@ -1559,7 +1548,7 @@ public readonly csr: string; The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} --- @@ -1573,7 +1562,7 @@ public readonly altNames: string[]; List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} --- @@ -1587,7 +1576,7 @@ public readonly country: string; The country. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} --- @@ -1601,7 +1590,7 @@ public readonly excludeCnFromSans: boolean | IResolvable; Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} --- @@ -1615,7 +1604,7 @@ public readonly format: string; The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} --- @@ -1627,7 +1616,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1644,7 +1633,7 @@ public readonly ipSans: string[]; List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} --- @@ -1658,7 +1647,7 @@ public readonly issuerRef: string; Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} --- @@ -1672,7 +1661,7 @@ public readonly locality: string; The locality. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} --- @@ -1686,7 +1675,7 @@ public readonly maxPathLength: number; The maximum path length to encode in the generated certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} --- @@ -1700,7 +1689,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} --- @@ -1714,7 +1703,7 @@ public readonly organization: string; The organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} --- @@ -1728,7 +1717,7 @@ public readonly otherSans: string[]; List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} --- @@ -1742,7 +1731,7 @@ public readonly ou: string; The organization unit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} --- @@ -1756,7 +1745,7 @@ public readonly permittedDnsDomains: string[]; List of domains for which certificates are allowed to be issued. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} --- @@ -1770,7 +1759,7 @@ public readonly postalCode: string; The postal code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} --- @@ -1784,7 +1773,7 @@ public readonly province: string; The province. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} --- @@ -1798,7 +1787,7 @@ public readonly revoke: boolean | IResolvable; Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} --- @@ -1812,7 +1801,7 @@ public readonly streetAddress: string; The street address. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} --- @@ -1826,7 +1815,7 @@ public readonly ttl: string; Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} --- @@ -1840,7 +1829,7 @@ public readonly uriSans: string[]; List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} --- @@ -1854,7 +1843,7 @@ public readonly useCsrValues: boolean | IResolvable; Preserve CSR values. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} --- diff --git a/docs/pkiSecretBackendSign.csharp.md b/docs/pkiSecretBackendSign.csharp.md index c5e21f11..936b65e7 100644 --- a/docs/pkiSecretBackendSign.csharp.md +++ b/docs/pkiSecretBackendSign.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendSign -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the PkiSecretBackendSign to im The id of the existing PkiSecretBackendSign that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use --- @@ -586,7 +586,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Expiration | double | *No description.* | | IssuingCa | string | *No description.* | | RenewPending | HashiCorp.Cdktf.IResolvable | *No description.* | -| Serial | string | *No description.* | | SerialNumber | string | *No description.* | | AltNamesInput | string[] | *No description.* | | AutoRenewInput | object | *No description.* | @@ -815,16 +814,6 @@ public IResolvable RenewPending { get; } --- -##### `Serial`Required - -```csharp -public string Serial { get; } -``` - -- *Type:* string - ---- - ##### `SerialNumber`Required ```csharp @@ -1228,7 +1217,7 @@ new PkiSecretBackendSignConfig { | AutoRenew | object | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | ExcludeCnFromSans | object | Flag to exclude CN from SANs. | | Format | string | The format of data. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | | IpSans | string[] | List of alternative IPs. | | IssuerRef | string | Specifies the default issuer of this request. | | MinSecondsRemaining | double | Generate a new certificate when the expiration is within this number of seconds. | @@ -1319,7 +1308,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} --- @@ -1333,7 +1322,7 @@ public string CommonName { get; set; } CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} --- @@ -1347,7 +1336,7 @@ public string Csr { get; set; } The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} --- @@ -1361,7 +1350,7 @@ public string Name { get; set; } Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} --- @@ -1375,7 +1364,7 @@ public string[] AltNames { get; set; } List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} --- @@ -1389,7 +1378,7 @@ public object AutoRenew { get; set; } If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} --- @@ -1403,7 +1392,7 @@ public object ExcludeCnFromSans { get; set; } Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} --- @@ -1417,7 +1406,7 @@ public string Format { get; set; } The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} --- @@ -1429,7 +1418,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1446,7 +1435,7 @@ public string[] IpSans { get; set; } List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} --- @@ -1460,7 +1449,7 @@ public string IssuerRef { get; set; } Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} --- @@ -1474,7 +1463,7 @@ public double MinSecondsRemaining { get; set; } Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} --- @@ -1488,7 +1477,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} --- @@ -1502,7 +1491,7 @@ public string[] OtherSans { get; set; } List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} --- @@ -1516,7 +1505,7 @@ public string Ttl { get; set; } Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} --- @@ -1530,7 +1519,7 @@ public string[] UriSans { get; set; } List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} --- diff --git a/docs/pkiSecretBackendSign.go.md b/docs/pkiSecretBackendSign.go.md index 7e805dc6..86961ac1 100644 --- a/docs/pkiSecretBackendSign.go.md +++ b/docs/pkiSecretBackendSign.go.md @@ -4,12 +4,12 @@ ### PkiSecretBackendSign -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendsign" pkisecretbackendsign.NewPkiSecretBackendSign(scope Construct, id *string, config PkiSecretBackendSignConfig) PkiSecretBackendSign ``` @@ -462,7 +462,7 @@ func ResetUriSans() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendsign" pkisecretbackendsign.PkiSecretBackendSign_IsConstruct(x interface{}) *bool ``` @@ -494,7 +494,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendsign" pkisecretbackendsign.PkiSecretBackendSign_IsTerraformElement(x interface{}) *bool ``` @@ -508,7 +508,7 @@ pkisecretbackendsign.PkiSecretBackendSign_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendsign" pkisecretbackendsign.PkiSecretBackendSign_IsTerraformResource(x interface{}) *bool ``` @@ -522,7 +522,7 @@ pkisecretbackendsign.PkiSecretBackendSign_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendsign" pkisecretbackendsign.PkiSecretBackendSign_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -551,7 +551,7 @@ The construct id used in the generated config for the PkiSecretBackendSign to im The id of the existing PkiSecretBackendSign that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use --- @@ -586,7 +586,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Expiration | *f64 | *No description.* | | IssuingCa | *string | *No description.* | | RenewPending | github.com/hashicorp/terraform-cdk-go/cdktf.IResolvable | *No description.* | -| Serial | *string | *No description.* | | SerialNumber | *string | *No description.* | | AltNamesInput | *[]*string | *No description.* | | AutoRenewInput | interface{} | *No description.* | @@ -815,16 +814,6 @@ func RenewPending() IResolvable --- -##### `Serial`Required - -```go -func Serial() *string -``` - -- *Type:* *string - ---- - ##### `SerialNumber`Required ```go @@ -1180,7 +1169,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendsign" &pkisecretbackendsign.PkiSecretBackendSignConfig { Connection: interface{}, @@ -1228,7 +1217,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/pkisecretbackendsign" | AutoRenew | interface{} | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | ExcludeCnFromSans | interface{} | Flag to exclude CN from SANs. | | Format | *string | The format of data. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | | IpSans | *[]*string | List of alternative IPs. | | IssuerRef | *string | Specifies the default issuer of this request. | | MinSecondsRemaining | *f64 | Generate a new certificate when the expiration is within this number of seconds. | @@ -1319,7 +1308,7 @@ Backend *string The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} --- @@ -1333,7 +1322,7 @@ CommonName *string CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} --- @@ -1347,7 +1336,7 @@ Csr *string The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} --- @@ -1361,7 +1350,7 @@ Name *string Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} --- @@ -1375,7 +1364,7 @@ AltNames *[]*string List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} --- @@ -1389,7 +1378,7 @@ AutoRenew interface{} If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} --- @@ -1403,7 +1392,7 @@ ExcludeCnFromSans interface{} Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} --- @@ -1417,7 +1406,7 @@ Format *string The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} --- @@ -1429,7 +1418,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1446,7 +1435,7 @@ IpSans *[]*string List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} --- @@ -1460,7 +1449,7 @@ IssuerRef *string Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} --- @@ -1474,7 +1463,7 @@ MinSecondsRemaining *f64 Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} --- @@ -1488,7 +1477,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} --- @@ -1502,7 +1491,7 @@ OtherSans *[]*string List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} --- @@ -1516,7 +1505,7 @@ Ttl *string Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} --- @@ -1530,7 +1519,7 @@ UriSans *[]*string List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} --- diff --git a/docs/pkiSecretBackendSign.java.md b/docs/pkiSecretBackendSign.java.md index af30ce1e..fdf4be5d 100644 --- a/docs/pkiSecretBackendSign.java.md +++ b/docs/pkiSecretBackendSign.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendSign -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. #### Initializers @@ -63,7 +63,7 @@ PkiSecretBackendSign.Builder.create(Construct scope, java.lang.String id) | autoRenew | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | minSecondsRemaining | java.lang.Number | Generate a new certificate when the expiration is within this number of seconds. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -231,7 +231,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} --- @@ -802,7 +802,7 @@ The construct id used in the generated config for the PkiSecretBackendSign to im The id of the existing PkiSecretBackendSign that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use --- @@ -837,7 +837,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | expiration | java.lang.Number | *No description.* | | issuingCa | java.lang.String | *No description.* | | renewPending | com.hashicorp.cdktf.IResolvable | *No description.* | -| serial | java.lang.String | *No description.* | | serialNumber | java.lang.String | *No description.* | | altNamesInput | java.util.List | *No description.* | | autoRenewInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -1066,16 +1065,6 @@ public IResolvable getRenewPending(); --- -##### `serial`Required - -```java -public java.lang.String getSerial(); -``` - -- *Type:* java.lang.String - ---- - ##### `serialNumber`Required ```java @@ -1485,7 +1474,7 @@ PkiSecretBackendSignConfig.builder() | autoRenew | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | minSecondsRemaining | java.lang.Number | Generate a new certificate when the expiration is within this number of seconds. | @@ -1576,7 +1565,7 @@ public java.lang.String getBackend(); The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} --- @@ -1590,7 +1579,7 @@ public java.lang.String getCommonName(); CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} --- @@ -1604,7 +1593,7 @@ public java.lang.String getCsr(); The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} --- @@ -1618,7 +1607,7 @@ public java.lang.String getName(); Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} --- @@ -1632,7 +1621,7 @@ public java.util.List getAltNames(); List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} --- @@ -1646,7 +1635,7 @@ public java.lang.Object getAutoRenew(); If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} --- @@ -1660,7 +1649,7 @@ public java.lang.Object getExcludeCnFromSans(); Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} --- @@ -1674,7 +1663,7 @@ public java.lang.String getFormat(); The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} --- @@ -1686,7 +1675,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1703,7 +1692,7 @@ public java.util.List getIpSans(); List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} --- @@ -1717,7 +1706,7 @@ public java.lang.String getIssuerRef(); Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} --- @@ -1731,7 +1720,7 @@ public java.lang.Number getMinSecondsRemaining(); Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} --- @@ -1745,7 +1734,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} --- @@ -1759,7 +1748,7 @@ public java.util.List getOtherSans(); List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} --- @@ -1773,7 +1762,7 @@ public java.lang.String getTtl(); Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} --- @@ -1787,7 +1776,7 @@ public java.util.List getUriSans(); List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} --- diff --git a/docs/pkiSecretBackendSign.python.md b/docs/pkiSecretBackendSign.python.md index 3407ec27..1416abd2 100644 --- a/docs/pkiSecretBackendSign.python.md +++ b/docs/pkiSecretBackendSign.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendSign -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. #### Initializers @@ -59,7 +59,7 @@ pkiSecretBackendSign.PkiSecretBackendSign( | auto_renew | typing.Union[bool, cdktf.IResolvable] | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_ref | str | Specifies the default issuer of this request. | | min_seconds_remaining | typing.Union[int, float] | Generate a new certificate when the expiration is within this number of seconds. | @@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -227,7 +227,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} --- @@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} --- @@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} --- @@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} --- @@ -844,7 +844,7 @@ The construct id used in the generated config for the PkiSecretBackendSign to im The id of the existing PkiSecretBackendSign that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use --- @@ -879,7 +879,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | expiration | typing.Union[int, float] | *No description.* | | issuing_ca | str | *No description.* | | renew_pending | cdktf.IResolvable | *No description.* | -| serial | str | *No description.* | | serial_number | str | *No description.* | | alt_names_input | typing.List[str] | *No description.* | | auto_renew_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -1108,16 +1107,6 @@ renew_pending: IResolvable --- -##### `serial`Required - -```python -serial: str -``` - -- *Type:* str - ---- - ##### `serial_number`Required ```python @@ -1521,7 +1510,7 @@ pkiSecretBackendSign.PkiSecretBackendSignConfig( | auto_renew | typing.Union[bool, cdktf.IResolvable] | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_ref | str | Specifies the default issuer of this request. | | min_seconds_remaining | typing.Union[int, float] | Generate a new certificate when the expiration is within this number of seconds. | @@ -1612,7 +1601,7 @@ backend: str The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} --- @@ -1626,7 +1615,7 @@ common_name: str CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} --- @@ -1640,7 +1629,7 @@ csr: str The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} --- @@ -1654,7 +1643,7 @@ name: str Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} --- @@ -1668,7 +1657,7 @@ alt_names: typing.List[str] List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} --- @@ -1682,7 +1671,7 @@ auto_renew: typing.Union[bool, IResolvable] If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} --- @@ -1696,7 +1685,7 @@ exclude_cn_from_sans: typing.Union[bool, IResolvable] Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} --- @@ -1710,7 +1699,7 @@ format: str The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} --- @@ -1722,7 +1711,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1739,7 +1728,7 @@ ip_sans: typing.List[str] List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} --- @@ -1753,7 +1742,7 @@ issuer_ref: str Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} --- @@ -1767,7 +1756,7 @@ min_seconds_remaining: typing.Union[int, float] Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} --- @@ -1781,7 +1770,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} --- @@ -1795,7 +1784,7 @@ other_sans: typing.List[str] List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} --- @@ -1809,7 +1798,7 @@ ttl: str Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} --- @@ -1823,7 +1812,7 @@ uri_sans: typing.List[str] List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} --- diff --git a/docs/pkiSecretBackendSign.typescript.md b/docs/pkiSecretBackendSign.typescript.md index 0fd44abb..07d40990 100644 --- a/docs/pkiSecretBackendSign.typescript.md +++ b/docs/pkiSecretBackendSign.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendSign -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the PkiSecretBackendSign to im The id of the existing PkiSecretBackendSign that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use --- @@ -586,7 +586,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | expiration | number | *No description.* | | issuingCa | string | *No description.* | | renewPending | cdktf.IResolvable | *No description.* | -| serial | string | *No description.* | | serialNumber | string | *No description.* | | altNamesInput | string[] | *No description.* | | autoRenewInput | boolean \| cdktf.IResolvable | *No description.* | @@ -815,16 +814,6 @@ public readonly renewPending: IResolvable; --- -##### `serial`Required - -```typescript -public readonly serial: string; -``` - -- *Type:* string - ---- - ##### `serialNumber`Required ```typescript @@ -1204,7 +1193,7 @@ const pkiSecretBackendSignConfig: pkiSecretBackendSign.PkiSecretBackendSignConfi | autoRenew | boolean \| cdktf.IResolvable | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | excludeCnFromSans | boolean \| cdktf.IResolvable | Flag to exclude CN from SANs. | | format | string | The format of data. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. | | ipSans | string[] | List of alternative IPs. | | issuerRef | string | Specifies the default issuer of this request. | | minSecondsRemaining | number | Generate a new certificate when the expiration is within this number of seconds. | @@ -1295,7 +1284,7 @@ public readonly backend: string; The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} --- @@ -1309,7 +1298,7 @@ public readonly commonName: string; CN of intermediate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} --- @@ -1323,7 +1312,7 @@ public readonly csr: string; The CSR. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} --- @@ -1337,7 +1326,7 @@ public readonly name: string; Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} --- @@ -1351,7 +1340,7 @@ public readonly altNames: string[]; List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} --- @@ -1365,7 +1354,7 @@ public readonly autoRenew: boolean | IResolvable; If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} --- @@ -1379,7 +1368,7 @@ public readonly excludeCnFromSans: boolean | IResolvable; Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} --- @@ -1393,7 +1382,7 @@ public readonly format: string; The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} --- @@ -1405,7 +1394,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1422,7 +1411,7 @@ public readonly ipSans: string[]; List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} --- @@ -1436,7 +1425,7 @@ public readonly issuerRef: string; Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} --- @@ -1450,7 +1439,7 @@ public readonly minSecondsRemaining: number; Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} --- @@ -1464,7 +1453,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} --- @@ -1478,7 +1467,7 @@ public readonly otherSans: string[]; List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} --- @@ -1492,7 +1481,7 @@ public readonly ttl: string; Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} --- @@ -1506,7 +1495,7 @@ public readonly uriSans: string[]; List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} --- diff --git a/docs/policy.csharp.md b/docs/policy.csharp.md index aa32b0d3..446cda5d 100644 --- a/docs/policy.csharp.md +++ b/docs/policy.csharp.md @@ -4,7 +4,7 @@ ### Policy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy vault_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy vault_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the Policy to import. The id of the existing Policy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ new PolicyConfig { | Provisioners | object[] | *No description.* | | Name | string | Name of the policy. | | Policy | string | The policy document. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ public string Name { get; set; } Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#name Policy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#name Policy#name} --- @@ -898,7 +898,7 @@ public string Policy { get; set; } The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#policy Policy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#policy Policy#policy} --- @@ -910,7 +910,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#namespace Policy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#namespace Policy#namespace} --- diff --git a/docs/policy.go.md b/docs/policy.go.md index a29baf28..5bddca39 100644 --- a/docs/policy.go.md +++ b/docs/policy.go.md @@ -4,12 +4,12 @@ ### Policy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy vault_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy vault_policy}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/policy" policy.NewPolicy(scope Construct, id *string, config PolicyConfig) Policy ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/policy" policy.Policy_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/policy" policy.Policy_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ policy.Policy_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/policy" policy.Policy_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ policy.Policy_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/policy" policy.Policy_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the Policy to import. The id of the existing Policy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/policy" &policy.PolicyConfig { Connection: interface{}, @@ -799,7 +799,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/policy" | Provisioners | *[]interface{} | *No description.* | | Name | *string | Name of the policy. | | Policy | *string | The policy document. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ Name *string Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#name Policy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#name Policy#name} --- @@ -898,7 +898,7 @@ Policy *string The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#policy Policy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#policy Policy#policy} --- @@ -910,7 +910,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#namespace Policy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#namespace Policy#namespace} --- diff --git a/docs/policy.java.md b/docs/policy.java.md index ecc770b4..74ff2db2 100644 --- a/docs/policy.java.md +++ b/docs/policy.java.md @@ -4,7 +4,7 @@ ### Policy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy vault_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy vault_policy}. #### Initializers @@ -43,7 +43,7 @@ Policy.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | Name of the policy. | | policy | java.lang.String | The policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#name Policy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#name Policy#name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#policy Policy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#policy Policy#policy} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#namespace Policy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#namespace Policy#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the Policy to import. The id of the existing Policy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ PolicyConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | Name of the policy. | | policy | java.lang.String | The policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ public java.lang.String getName(); Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#name Policy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#name Policy#name} --- @@ -1007,7 +1007,7 @@ public java.lang.String getPolicy(); The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#policy Policy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#policy Policy#policy} --- @@ -1019,7 +1019,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#namespace Policy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#namespace Policy#namespace} --- diff --git a/docs/policy.python.md b/docs/policy.python.md index dec6e6f2..d1edf69c 100644 --- a/docs/policy.python.md +++ b/docs/policy.python.md @@ -4,7 +4,7 @@ ### Policy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy vault_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy vault_policy}. #### Initializers @@ -41,7 +41,7 @@ policy.Policy( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | Name of the policy. | | policy | str | The policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#name Policy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#name Policy#name} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#policy Policy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#policy Policy#policy} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#namespace Policy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#namespace Policy#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the Policy to import. The id of the existing Policy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use --- @@ -948,7 +948,7 @@ policy.PolicyConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | Name of the policy. | | policy | str | The policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1033,7 +1033,7 @@ name: str Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#name Policy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#name Policy#name} --- @@ -1047,7 +1047,7 @@ policy: str The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#policy Policy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#policy Policy#policy} --- @@ -1059,7 +1059,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#namespace Policy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#namespace Policy#namespace} --- diff --git a/docs/policy.typescript.md b/docs/policy.typescript.md index 87bcdaaf..503e80be 100644 --- a/docs/policy.typescript.md +++ b/docs/policy.typescript.md @@ -4,7 +4,7 @@ ### Policy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy vault_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy vault_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the Policy to import. The id of the existing Policy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ const policyConfig: policy.PolicyConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | Name of the policy. | | policy | string | The policy document. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ public readonly name: string; Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#name Policy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#name Policy#name} --- @@ -886,7 +886,7 @@ public readonly policy: string; The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#policy Policy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#policy Policy#policy} --- @@ -898,7 +898,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#namespace Policy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#namespace Policy#namespace} --- diff --git a/docs/provider.csharp.md b/docs/provider.csharp.md index 5a0b7159..5c6d75ef 100644 --- a/docs/provider.csharp.md +++ b/docs/provider.csharp.md @@ -4,7 +4,7 @@ ### VaultProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs vault}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs vault}. #### Initializers @@ -443,7 +443,7 @@ The construct id used in the generated config for the VaultProvider to import. The id of the existing VaultProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#import import section} in the documentation of this resource for the id to use --- @@ -1274,10 +1274,10 @@ new VaultProviderAuthLogin { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. | -| Method | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. | +| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. | +| Method | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. | | Namespace | string | The authentication engine's namespace. Conflicts with use_root_namespace. | -| Parameters | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. | +| Parameters | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. | | UseRootNamespace | object | Authenticate to the root Vault namespace. Conflicts with namespace. | --- @@ -1290,7 +1290,7 @@ public string Path { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. --- @@ -1302,7 +1302,7 @@ public string Method { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. --- @@ -1316,7 +1316,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1328,7 +1328,7 @@ public System.Collections.Generic.IDictionary Parameters { get; - *Type:* System.Collections.Generic.IDictionary -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. --- @@ -1342,7 +1342,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1406,7 +1406,7 @@ public string Role { get; set; } The Vault role to use when logging into Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -1420,7 +1420,7 @@ public string AwsAccessKeyId { get; set; } The AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} --- @@ -1434,7 +1434,7 @@ public string AwsIamEndpoint { get; set; } The IAM endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} --- @@ -1448,7 +1448,7 @@ public string AwsProfile { get; set; } The name of the AWS profile. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_profile VaultProvider#aws_profile} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_profile VaultProvider#aws_profile} --- @@ -1462,7 +1462,7 @@ public string AwsRegion { get; set; } The AWS region. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_region VaultProvider#aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_region VaultProvider#aws_region} --- @@ -1476,7 +1476,7 @@ public string AwsRoleArn { get; set; } The ARN of the AWS Role to assume.Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_arn VaultProvider#aws_role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_arn VaultProvider#aws_role_arn} --- @@ -1490,7 +1490,7 @@ public string AwsRoleSessionName { get; set; } Specifies the name to attach to the AWS role session. Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} --- @@ -1504,7 +1504,7 @@ public string AwsSecretAccessKey { get; set; } The AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} --- @@ -1518,7 +1518,7 @@ public string AwsSessionToken { get; set; } The AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_session_token VaultProvider#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_session_token VaultProvider#aws_session_token} --- @@ -1532,7 +1532,7 @@ public string AwsSharedCredentialsFile { get; set; } Path to the AWS shared credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} --- @@ -1546,7 +1546,7 @@ public string AwsStsEndpoint { get; set; } The STS endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} --- @@ -1560,7 +1560,7 @@ public string AwsWebIdentityTokenFile { get; set; } Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} --- @@ -1574,7 +1574,7 @@ public string HeaderValue { get; set; } The Vault header value to include in the STS signing request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#header_value VaultProvider#header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#header_value VaultProvider#header_value} --- @@ -1588,7 +1588,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1602,7 +1602,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1616,7 +1616,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1672,7 +1672,7 @@ public string ResourceGroupName { get; set; } The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#resource_group_name VaultProvider#resource_group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#resource_group_name VaultProvider#resource_group_name} --- @@ -1686,7 +1686,7 @@ public string Role { get; set; } Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -1700,7 +1700,7 @@ public string SubscriptionId { get; set; } The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#subscription_id VaultProvider#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#subscription_id VaultProvider#subscription_id} --- @@ -1714,7 +1714,7 @@ public string ClientId { get; set; } The identity's client ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_id VaultProvider#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_id VaultProvider#client_id} --- @@ -1728,7 +1728,7 @@ public string Jwt { get; set; } A signed JSON Web Token. If not specified on will be created automatically. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -1742,7 +1742,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1756,7 +1756,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1770,7 +1770,7 @@ public string Scope { get; set; } The scopes to include in the token request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#scope VaultProvider#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#scope VaultProvider#scope} --- @@ -1784,7 +1784,7 @@ public string TenantId { get; set; } Provides the tenant ID to use in a multi-tenant authentication scenario. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tenant_id VaultProvider#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tenant_id VaultProvider#tenant_id} --- @@ -1798,7 +1798,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1814,7 +1814,7 @@ The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vm_name VaultProvider#vm_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vm_name VaultProvider#vm_name} --- @@ -1830,7 +1830,7 @@ The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vmss_name VaultProvider#vmss_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vmss_name VaultProvider#vmss_name} --- @@ -1874,7 +1874,7 @@ public string CertFile { get; set; } Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -1888,7 +1888,7 @@ public string KeyFile { get; set; } Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -1902,7 +1902,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1916,7 +1916,7 @@ public string Name { get; set; } Name of the certificate's role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -1930,7 +1930,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1944,7 +1944,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1990,7 +1990,7 @@ public string Role { get; set; } Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2004,7 +2004,7 @@ public string Credentials { get; set; } Path to the Google Cloud credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#credentials VaultProvider#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#credentials VaultProvider#credentials} --- @@ -2018,7 +2018,7 @@ public string Jwt { get; set; } A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2032,7 +2032,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2046,7 +2046,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2060,7 +2060,7 @@ public string ServiceAccount { get; set; } IAM service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service_account VaultProvider#service_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service_account VaultProvider#service_account} --- @@ -2074,7 +2074,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2116,7 +2116,7 @@ public string Jwt { get; set; } A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2130,7 +2130,7 @@ public string Role { get; set; } Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2144,7 +2144,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2158,7 +2158,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2172,7 +2172,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2226,7 +2226,7 @@ public object DisableFastNegotiation { get; set; } Disable the Kerberos FAST negotiation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} --- @@ -2240,7 +2240,7 @@ public string KeytabPath { get; set; } The Kerberos keytab file containing the entry of the login entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#keytab_path VaultProvider#keytab_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#keytab_path VaultProvider#keytab_path} --- @@ -2254,7 +2254,7 @@ public string Krb5ConfPath { get; set; } A valid Kerberos configuration file e.g. /etc/krb5.conf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#krb5conf_path VaultProvider#krb5conf_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#krb5conf_path VaultProvider#krb5conf_path} --- @@ -2268,7 +2268,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2282,7 +2282,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2296,7 +2296,7 @@ public string Realm { get; set; } The Kerberos server's authoritative authentication domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#realm VaultProvider#realm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#realm VaultProvider#realm} --- @@ -2310,7 +2310,7 @@ public object RemoveInstanceName { get; set; } Strip the host from the username found in the keytab. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#remove_instance_name VaultProvider#remove_instance_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#remove_instance_name VaultProvider#remove_instance_name} --- @@ -2324,7 +2324,7 @@ public string Service { get; set; } The service principle name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service VaultProvider#service} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service VaultProvider#service} --- @@ -2338,7 +2338,7 @@ public string Token { get; set; } Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -2352,7 +2352,7 @@ public string Username { get; set; } The username to login into Kerberos with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2366,7 +2366,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2408,7 +2408,7 @@ public string AuthType { get; set; } Authentication type to use when getting OCI credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_type VaultProvider#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_type VaultProvider#auth_type} --- @@ -2422,7 +2422,7 @@ public string Role { get; set; } Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2436,7 +2436,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2450,7 +2450,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2464,7 +2464,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2508,7 +2508,7 @@ public string Role { get; set; } Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2522,7 +2522,7 @@ public string CallbackAddress { get; set; } The callback address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_address VaultProvider#callback_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_address VaultProvider#callback_address} --- @@ -2536,7 +2536,7 @@ public string CallbackListenerAddress { get; set; } The callback listener's address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_listener_address VaultProvider#callback_listener_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_listener_address VaultProvider#callback_listener_address} --- @@ -2550,7 +2550,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2564,7 +2564,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2578,7 +2578,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2620,7 +2620,7 @@ public string Password { get; set; } The Radius password for username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -2634,7 +2634,7 @@ public string Username { get; set; } The Radius username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2648,7 +2648,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2662,7 +2662,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2676,7 +2676,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2714,7 +2714,7 @@ public string Filename { get; set; } The name of a file containing a single line that is a valid Vault token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#filename VaultProvider#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#filename VaultProvider#filename} --- @@ -2728,7 +2728,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2742,7 +2742,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2786,7 +2786,7 @@ public string Username { get; set; } Login with username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2800,7 +2800,7 @@ public string Mount { get; set; } The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2814,7 +2814,7 @@ public string Namespace { get; set; } The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2828,7 +2828,7 @@ public string Password { get; set; } Login with password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -2842,7 +2842,7 @@ public string PasswordFile { get; set; } Login with password from a file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password_file VaultProvider#password_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password_file VaultProvider#password_file} --- @@ -2856,7 +2856,7 @@ public object UseRootNamespace { get; set; } Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2892,7 +2892,7 @@ public string CertFile { get; set; } Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -2906,7 +2906,7 @@ public string KeyFile { get; set; } Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -3000,7 +3000,7 @@ public string Address { get; set; } URL of the root of the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#address VaultProvider#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#address VaultProvider#address} --- @@ -3014,7 +3014,7 @@ public string AddAddressToEnv { get; set; } If true, adds the value of the `address` argument to the Terraform process environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#add_address_to_env VaultProvider#add_address_to_env} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#add_address_to_env VaultProvider#add_address_to_env} --- @@ -3028,7 +3028,7 @@ public string Alias { get; set; } Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#alias VaultProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#alias VaultProvider#alias} --- @@ -3042,7 +3042,7 @@ public VaultProviderAuthLogin AuthLogin { get; set; } auth_login block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login VaultProvider#auth_login} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login VaultProvider#auth_login} --- @@ -3056,7 +3056,7 @@ public VaultProviderAuthLoginAws AuthLoginAws { get; set; } auth_login_aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_aws VaultProvider#auth_login_aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_aws VaultProvider#auth_login_aws} --- @@ -3070,7 +3070,7 @@ public VaultProviderAuthLoginAzure AuthLoginAzure { get; set; } auth_login_azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_azure VaultProvider#auth_login_azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_azure VaultProvider#auth_login_azure} --- @@ -3084,7 +3084,7 @@ public VaultProviderAuthLoginCert AuthLoginCert { get; set; } auth_login_cert block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_cert VaultProvider#auth_login_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_cert VaultProvider#auth_login_cert} --- @@ -3098,7 +3098,7 @@ public VaultProviderAuthLoginGcp AuthLoginGcp { get; set; } auth_login_gcp block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} --- @@ -3112,7 +3112,7 @@ public VaultProviderAuthLoginJwt AuthLoginJwt { get; set; } auth_login_jwt block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} --- @@ -3126,7 +3126,7 @@ public VaultProviderAuthLoginKerberos AuthLoginKerberos { get; set; } auth_login_kerberos block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} --- @@ -3140,7 +3140,7 @@ public VaultProviderAuthLoginOci AuthLoginOci { get; set; } auth_login_oci block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oci VaultProvider#auth_login_oci} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oci VaultProvider#auth_login_oci} --- @@ -3154,7 +3154,7 @@ public VaultProviderAuthLoginOidc AuthLoginOidc { get; set; } auth_login_oidc block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} --- @@ -3168,7 +3168,7 @@ public VaultProviderAuthLoginRadius AuthLoginRadius { get; set; } auth_login_radius block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_radius VaultProvider#auth_login_radius} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_radius VaultProvider#auth_login_radius} --- @@ -3182,7 +3182,7 @@ public VaultProviderAuthLoginTokenFile AuthLoginTokenFile { get; set; } auth_login_token_file block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} --- @@ -3196,7 +3196,7 @@ public VaultProviderAuthLoginUserpass AuthLoginUserpass { get; set; } auth_login_userpass block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} --- @@ -3210,7 +3210,7 @@ public string CaCertDir { get; set; } Path to directory containing CA certificate files to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} --- @@ -3224,7 +3224,7 @@ public string CaCertFile { get; set; } Path to a CA certificate file to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_file VaultProvider#ca_cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_file VaultProvider#ca_cert_file} --- @@ -3238,7 +3238,7 @@ public VaultProviderClientAuth ClientAuth { get; set; } client_auth block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_auth VaultProvider#client_auth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_auth VaultProvider#client_auth} --- @@ -3252,7 +3252,7 @@ public object Headers { get; set; } headers block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#headers VaultProvider#headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#headers VaultProvider#headers} --- @@ -3266,7 +3266,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum TTL for secret leases requested by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} --- @@ -3280,7 +3280,7 @@ public double MaxRetries { get; set; } Maximum number of retries when a 5xx error code is encountered. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries VaultProvider#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries VaultProvider#max_retries} --- @@ -3294,7 +3294,7 @@ public double MaxRetriesCcc { get; set; } Maximum number of retries for Client Controlled Consistency related operations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} --- @@ -3308,7 +3308,7 @@ public string Namespace { get; set; } The namespace to use. Available only for Vault Enterprise. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3322,7 +3322,7 @@ public object SetNamespaceFromToken { get; set; } In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} --- @@ -3336,7 +3336,7 @@ public object SkipChildToken { get; set; } Set this to true to prevent the creation of ephemeral child token used by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_child_token VaultProvider#skip_child_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_child_token VaultProvider#skip_child_token} --- @@ -3350,7 +3350,7 @@ public object SkipGetVaultVersion { get; set; } Skip the dynamic fetching of the Vault server version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} --- @@ -3364,7 +3364,7 @@ public object SkipTlsVerify { get; set; } Set this to true only if the target Vault server is an insecure development instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} --- @@ -3378,7 +3378,7 @@ public string TlsServerName { get; set; } Name to use as the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tls_server_name VaultProvider#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tls_server_name VaultProvider#tls_server_name} --- @@ -3392,7 +3392,7 @@ public string Token { get; set; } Token to use to authenticate to Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -3406,7 +3406,7 @@ public string TokenName { get; set; } Token name to use for creating the Vault child token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token_name VaultProvider#token_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token_name VaultProvider#token_name} --- @@ -3420,7 +3420,7 @@ public string VaultVersionOverride { get; set; } Override the Vault server version, which is normally determined dynamically from the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vault_version_override VaultProvider#vault_version_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vault_version_override VaultProvider#vault_version_override} --- @@ -3456,7 +3456,7 @@ public string Name { get; set; } The header name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -3470,7 +3470,7 @@ public string Value { get; set; } The header value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#value VaultProvider#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#value VaultProvider#value} --- diff --git a/docs/provider.go.md b/docs/provider.go.md index d11ddfcb..c4771771 100644 --- a/docs/provider.go.md +++ b/docs/provider.go.md @@ -4,12 +4,12 @@ ### VaultProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs vault}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs vault}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" provider.NewVaultProvider(scope Construct, id *string, config VaultProviderConfig) VaultProvider ``` @@ -354,7 +354,7 @@ func ResetVaultVersionOverride() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" provider.VaultProvider_IsConstruct(x interface{}) *bool ``` @@ -386,7 +386,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" provider.VaultProvider_IsTerraformElement(x interface{}) *bool ``` @@ -400,7 +400,7 @@ provider.VaultProvider_IsTerraformElement(x interface{}) *bool ##### `IsTerraformProvider` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" provider.VaultProvider_IsTerraformProvider(x interface{}) *bool ``` @@ -414,7 +414,7 @@ provider.VaultProvider_IsTerraformProvider(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" provider.VaultProvider_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -443,7 +443,7 @@ The construct id used in the generated config for the VaultProvider to import. The id of the existing VaultProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#import import section} in the documentation of this resource for the id to use --- @@ -1259,7 +1259,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLogin { Path: *string, @@ -1274,10 +1274,10 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" | **Name** | **Type** | **Description** | | --- | --- | --- | -| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. | -| Method | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. | +| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. | +| Method | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. | | Namespace | *string | The authentication engine's namespace. Conflicts with use_root_namespace. | -| Parameters | *map[string]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. | +| Parameters | *map[string]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. | | UseRootNamespace | interface{} | Authenticate to the root Vault namespace. Conflicts with namespace. | --- @@ -1290,7 +1290,7 @@ Path *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. --- @@ -1302,7 +1302,7 @@ Method *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. --- @@ -1316,7 +1316,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1328,7 +1328,7 @@ Parameters *map[string]*string - *Type:* *map[string]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. --- @@ -1342,7 +1342,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1351,7 +1351,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginAws { Role: *string, @@ -1406,7 +1406,7 @@ Role *string The Vault role to use when logging into Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -1420,7 +1420,7 @@ AwsAccessKeyId *string The AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} --- @@ -1434,7 +1434,7 @@ AwsIamEndpoint *string The IAM endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} --- @@ -1448,7 +1448,7 @@ AwsProfile *string The name of the AWS profile. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_profile VaultProvider#aws_profile} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_profile VaultProvider#aws_profile} --- @@ -1462,7 +1462,7 @@ AwsRegion *string The AWS region. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_region VaultProvider#aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_region VaultProvider#aws_region} --- @@ -1476,7 +1476,7 @@ AwsRoleArn *string The ARN of the AWS Role to assume.Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_arn VaultProvider#aws_role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_arn VaultProvider#aws_role_arn} --- @@ -1490,7 +1490,7 @@ AwsRoleSessionName *string Specifies the name to attach to the AWS role session. Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} --- @@ -1504,7 +1504,7 @@ AwsSecretAccessKey *string The AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} --- @@ -1518,7 +1518,7 @@ AwsSessionToken *string The AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_session_token VaultProvider#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_session_token VaultProvider#aws_session_token} --- @@ -1532,7 +1532,7 @@ AwsSharedCredentialsFile *string Path to the AWS shared credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} --- @@ -1546,7 +1546,7 @@ AwsStsEndpoint *string The STS endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} --- @@ -1560,7 +1560,7 @@ AwsWebIdentityTokenFile *string Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} --- @@ -1574,7 +1574,7 @@ HeaderValue *string The Vault header value to include in the STS signing request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#header_value VaultProvider#header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#header_value VaultProvider#header_value} --- @@ -1588,7 +1588,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1602,7 +1602,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1616,7 +1616,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1625,7 +1625,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginAzure { ResourceGroupName: *string, @@ -1672,7 +1672,7 @@ ResourceGroupName *string The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#resource_group_name VaultProvider#resource_group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#resource_group_name VaultProvider#resource_group_name} --- @@ -1686,7 +1686,7 @@ Role *string Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -1700,7 +1700,7 @@ SubscriptionId *string The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#subscription_id VaultProvider#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#subscription_id VaultProvider#subscription_id} --- @@ -1714,7 +1714,7 @@ ClientId *string The identity's client ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_id VaultProvider#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_id VaultProvider#client_id} --- @@ -1728,7 +1728,7 @@ Jwt *string A signed JSON Web Token. If not specified on will be created automatically. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -1742,7 +1742,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1756,7 +1756,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1770,7 +1770,7 @@ Scope *string The scopes to include in the token request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#scope VaultProvider#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#scope VaultProvider#scope} --- @@ -1784,7 +1784,7 @@ TenantId *string Provides the tenant ID to use in a multi-tenant authentication scenario. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tenant_id VaultProvider#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tenant_id VaultProvider#tenant_id} --- @@ -1798,7 +1798,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1814,7 +1814,7 @@ The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vm_name VaultProvider#vm_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vm_name VaultProvider#vm_name} --- @@ -1830,7 +1830,7 @@ The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vmss_name VaultProvider#vmss_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vmss_name VaultProvider#vmss_name} --- @@ -1839,7 +1839,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginCert { CertFile: *string, @@ -1874,7 +1874,7 @@ CertFile *string Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -1888,7 +1888,7 @@ KeyFile *string Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -1902,7 +1902,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1916,7 +1916,7 @@ Name *string Name of the certificate's role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -1930,7 +1930,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1944,7 +1944,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1953,7 +1953,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginGcp { Role: *string, @@ -1990,7 +1990,7 @@ Role *string Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2004,7 +2004,7 @@ Credentials *string Path to the Google Cloud credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#credentials VaultProvider#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#credentials VaultProvider#credentials} --- @@ -2018,7 +2018,7 @@ Jwt *string A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2032,7 +2032,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2046,7 +2046,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2060,7 +2060,7 @@ ServiceAccount *string IAM service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service_account VaultProvider#service_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service_account VaultProvider#service_account} --- @@ -2074,7 +2074,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2083,7 +2083,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginJwt { Jwt: *string, @@ -2116,7 +2116,7 @@ Jwt *string A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2130,7 +2130,7 @@ Role *string Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2144,7 +2144,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2158,7 +2158,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2172,7 +2172,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2181,7 +2181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginKerberos { DisableFastNegotiation: interface{}, @@ -2226,7 +2226,7 @@ DisableFastNegotiation interface{} Disable the Kerberos FAST negotiation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} --- @@ -2240,7 +2240,7 @@ KeytabPath *string The Kerberos keytab file containing the entry of the login entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#keytab_path VaultProvider#keytab_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#keytab_path VaultProvider#keytab_path} --- @@ -2254,7 +2254,7 @@ Krb5ConfPath *string A valid Kerberos configuration file e.g. /etc/krb5.conf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#krb5conf_path VaultProvider#krb5conf_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#krb5conf_path VaultProvider#krb5conf_path} --- @@ -2268,7 +2268,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2282,7 +2282,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2296,7 +2296,7 @@ Realm *string The Kerberos server's authoritative authentication domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#realm VaultProvider#realm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#realm VaultProvider#realm} --- @@ -2310,7 +2310,7 @@ RemoveInstanceName interface{} Strip the host from the username found in the keytab. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#remove_instance_name VaultProvider#remove_instance_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#remove_instance_name VaultProvider#remove_instance_name} --- @@ -2324,7 +2324,7 @@ Service *string The service principle name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service VaultProvider#service} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service VaultProvider#service} --- @@ -2338,7 +2338,7 @@ Token *string Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -2352,7 +2352,7 @@ Username *string The username to login into Kerberos with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2366,7 +2366,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2375,7 +2375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginOci { AuthType: *string, @@ -2408,7 +2408,7 @@ AuthType *string Authentication type to use when getting OCI credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_type VaultProvider#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_type VaultProvider#auth_type} --- @@ -2422,7 +2422,7 @@ Role *string Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2436,7 +2436,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2450,7 +2450,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2464,7 +2464,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2473,7 +2473,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginOidc { Role: *string, @@ -2508,7 +2508,7 @@ Role *string Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2522,7 +2522,7 @@ CallbackAddress *string The callback address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_address VaultProvider#callback_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_address VaultProvider#callback_address} --- @@ -2536,7 +2536,7 @@ CallbackListenerAddress *string The callback listener's address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_listener_address VaultProvider#callback_listener_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_listener_address VaultProvider#callback_listener_address} --- @@ -2550,7 +2550,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2564,7 +2564,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2578,7 +2578,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2587,7 +2587,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginRadius { Password: *string, @@ -2620,7 +2620,7 @@ Password *string The Radius password for username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -2634,7 +2634,7 @@ Username *string The Radius username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2648,7 +2648,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2662,7 +2662,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2676,7 +2676,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2685,7 +2685,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginTokenFile { Filename: *string, @@ -2714,7 +2714,7 @@ Filename *string The name of a file containing a single line that is a valid Vault token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#filename VaultProvider#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#filename VaultProvider#filename} --- @@ -2728,7 +2728,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2742,7 +2742,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2751,7 +2751,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderAuthLoginUserpass { Username: *string, @@ -2786,7 +2786,7 @@ Username *string Login with username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2800,7 +2800,7 @@ Mount *string The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2814,7 +2814,7 @@ Namespace *string The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2828,7 +2828,7 @@ Password *string Login with password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -2842,7 +2842,7 @@ PasswordFile *string Login with password from a file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password_file VaultProvider#password_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password_file VaultProvider#password_file} --- @@ -2856,7 +2856,7 @@ UseRootNamespace interface{} Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2865,7 +2865,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderClientAuth { CertFile: *string, @@ -2892,7 +2892,7 @@ CertFile *string Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -2906,7 +2906,7 @@ KeyFile *string Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -2915,27 +2915,27 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderConfig { Address: *string, AddAddressToEnv: *string, Alias: *string, - AuthLogin: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLogin, - AuthLoginAws: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginAws, - AuthLoginAzure: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginAzure, - AuthLoginCert: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginCert, - AuthLoginGcp: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginGcp, - AuthLoginJwt: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginJwt, - AuthLoginKerberos: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginKerberos, - AuthLoginOci: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginOci, - AuthLoginOidc: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginOidc, - AuthLoginRadius: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginRadius, - AuthLoginTokenFile: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginTokenFile, - AuthLoginUserpass: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderAuthLoginUserpass, + AuthLogin: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLogin, + AuthLoginAws: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginAws, + AuthLoginAzure: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginAzure, + AuthLoginCert: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginCert, + AuthLoginGcp: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginGcp, + AuthLoginJwt: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginJwt, + AuthLoginKerberos: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginKerberos, + AuthLoginOci: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginOci, + AuthLoginOidc: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginOidc, + AuthLoginRadius: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginRadius, + AuthLoginTokenFile: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginTokenFile, + AuthLoginUserpass: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderAuthLoginUserpass, CaCertDir: *string, CaCertFile: *string, - ClientAuth: github.com/cdktf/cdktf-provider-vault-go/vault/v12.provider.VaultProviderClientAuth, + ClientAuth: github.com/cdktf/cdktf-provider-vault-go/vault/v13.provider.VaultProviderClientAuth, Headers: interface{}, MaxLeaseTtlSeconds: *f64, MaxRetries: *f64, @@ -3000,7 +3000,7 @@ Address *string URL of the root of the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#address VaultProvider#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#address VaultProvider#address} --- @@ -3014,7 +3014,7 @@ AddAddressToEnv *string If true, adds the value of the `address` argument to the Terraform process environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#add_address_to_env VaultProvider#add_address_to_env} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#add_address_to_env VaultProvider#add_address_to_env} --- @@ -3028,7 +3028,7 @@ Alias *string Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#alias VaultProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#alias VaultProvider#alias} --- @@ -3042,7 +3042,7 @@ AuthLogin VaultProviderAuthLogin auth_login block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login VaultProvider#auth_login} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login VaultProvider#auth_login} --- @@ -3056,7 +3056,7 @@ AuthLoginAws VaultProviderAuthLoginAws auth_login_aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_aws VaultProvider#auth_login_aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_aws VaultProvider#auth_login_aws} --- @@ -3070,7 +3070,7 @@ AuthLoginAzure VaultProviderAuthLoginAzure auth_login_azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_azure VaultProvider#auth_login_azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_azure VaultProvider#auth_login_azure} --- @@ -3084,7 +3084,7 @@ AuthLoginCert VaultProviderAuthLoginCert auth_login_cert block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_cert VaultProvider#auth_login_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_cert VaultProvider#auth_login_cert} --- @@ -3098,7 +3098,7 @@ AuthLoginGcp VaultProviderAuthLoginGcp auth_login_gcp block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} --- @@ -3112,7 +3112,7 @@ AuthLoginJwt VaultProviderAuthLoginJwt auth_login_jwt block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} --- @@ -3126,7 +3126,7 @@ AuthLoginKerberos VaultProviderAuthLoginKerberos auth_login_kerberos block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} --- @@ -3140,7 +3140,7 @@ AuthLoginOci VaultProviderAuthLoginOci auth_login_oci block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oci VaultProvider#auth_login_oci} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oci VaultProvider#auth_login_oci} --- @@ -3154,7 +3154,7 @@ AuthLoginOidc VaultProviderAuthLoginOidc auth_login_oidc block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} --- @@ -3168,7 +3168,7 @@ AuthLoginRadius VaultProviderAuthLoginRadius auth_login_radius block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_radius VaultProvider#auth_login_radius} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_radius VaultProvider#auth_login_radius} --- @@ -3182,7 +3182,7 @@ AuthLoginTokenFile VaultProviderAuthLoginTokenFile auth_login_token_file block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} --- @@ -3196,7 +3196,7 @@ AuthLoginUserpass VaultProviderAuthLoginUserpass auth_login_userpass block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} --- @@ -3210,7 +3210,7 @@ CaCertDir *string Path to directory containing CA certificate files to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} --- @@ -3224,7 +3224,7 @@ CaCertFile *string Path to a CA certificate file to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_file VaultProvider#ca_cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_file VaultProvider#ca_cert_file} --- @@ -3238,7 +3238,7 @@ ClientAuth VaultProviderClientAuth client_auth block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_auth VaultProvider#client_auth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_auth VaultProvider#client_auth} --- @@ -3252,7 +3252,7 @@ Headers interface{} headers block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#headers VaultProvider#headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#headers VaultProvider#headers} --- @@ -3266,7 +3266,7 @@ MaxLeaseTtlSeconds *f64 Maximum TTL for secret leases requested by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} --- @@ -3280,7 +3280,7 @@ MaxRetries *f64 Maximum number of retries when a 5xx error code is encountered. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries VaultProvider#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries VaultProvider#max_retries} --- @@ -3294,7 +3294,7 @@ MaxRetriesCcc *f64 Maximum number of retries for Client Controlled Consistency related operations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} --- @@ -3308,7 +3308,7 @@ Namespace *string The namespace to use. Available only for Vault Enterprise. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3322,7 +3322,7 @@ SetNamespaceFromToken interface{} In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} --- @@ -3336,7 +3336,7 @@ SkipChildToken interface{} Set this to true to prevent the creation of ephemeral child token used by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_child_token VaultProvider#skip_child_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_child_token VaultProvider#skip_child_token} --- @@ -3350,7 +3350,7 @@ SkipGetVaultVersion interface{} Skip the dynamic fetching of the Vault server version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} --- @@ -3364,7 +3364,7 @@ SkipTlsVerify interface{} Set this to true only if the target Vault server is an insecure development instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} --- @@ -3378,7 +3378,7 @@ TlsServerName *string Name to use as the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tls_server_name VaultProvider#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tls_server_name VaultProvider#tls_server_name} --- @@ -3392,7 +3392,7 @@ Token *string Token to use to authenticate to Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -3406,7 +3406,7 @@ TokenName *string Token name to use for creating the Vault child token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token_name VaultProvider#token_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token_name VaultProvider#token_name} --- @@ -3420,7 +3420,7 @@ VaultVersionOverride *string Override the Vault server version, which is normally determined dynamically from the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vault_version_override VaultProvider#vault_version_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vault_version_override VaultProvider#vault_version_override} --- @@ -3429,7 +3429,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/provider" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/provider" &provider.VaultProviderHeaders { Name: *string, @@ -3456,7 +3456,7 @@ Name *string The header name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -3470,7 +3470,7 @@ Value *string The header value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#value VaultProvider#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#value VaultProvider#value} --- diff --git a/docs/provider.java.md b/docs/provider.java.md index 62fd956f..c4d9461a 100644 --- a/docs/provider.java.md +++ b/docs/provider.java.md @@ -4,7 +4,7 @@ ### VaultProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs vault}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs vault}. #### Initializers @@ -113,7 +113,7 @@ Must be unique amongst siblings in the same scope URL of the root of the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#address VaultProvider#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#address VaultProvider#address} --- @@ -123,7 +123,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, adds the value of the `address` argument to the Terraform process environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#add_address_to_env VaultProvider#add_address_to_env} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#add_address_to_env VaultProvider#add_address_to_env} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#alias VaultProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#alias VaultProvider#alias} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login VaultProvider#auth_login} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login VaultProvider#auth_login} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_aws VaultProvider#auth_login_aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_aws VaultProvider#auth_login_aws} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_azure VaultProvider#auth_login_azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_azure VaultProvider#auth_login_azure} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_cert block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_cert VaultProvider#auth_login_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_cert VaultProvider#auth_login_cert} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_gcp block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_jwt block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_kerberos block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_oci block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oci VaultProvider#auth_login_oci} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oci VaultProvider#auth_login_oci} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_oidc block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_radius block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_radius VaultProvider#auth_login_radius} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_radius VaultProvider#auth_login_radius} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_token_file block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_userpass block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to directory containing CA certificate files to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to a CA certificate file to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_file VaultProvider#ca_cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_file VaultProvider#ca_cert_file} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi client_auth block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_auth VaultProvider#client_auth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_auth VaultProvider#client_auth} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi headers block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#headers VaultProvider#headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#headers VaultProvider#headers} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TTL for secret leases requested by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of retries when a 5xx error code is encountered. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries VaultProvider#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries VaultProvider#max_retries} --- @@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of retries for Client Controlled Consistency related operations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} --- @@ -333,7 +333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The namespace to use. Available only for Vault Enterprise. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -343,7 +343,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} --- @@ -353,7 +353,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set this to true to prevent the creation of ephemeral child token used by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_child_token VaultProvider#skip_child_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_child_token VaultProvider#skip_child_token} --- @@ -363,7 +363,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Skip the dynamic fetching of the Vault server version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} --- @@ -373,7 +373,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set this to true only if the target Vault server is an insecure development instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} --- @@ -383,7 +383,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name to use as the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tls_server_name VaultProvider#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tls_server_name VaultProvider#tls_server_name} --- @@ -393,7 +393,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Token to use to authenticate to Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -403,7 +403,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Token name to use for creating the Vault child token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token_name VaultProvider#token_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token_name VaultProvider#token_name} --- @@ -413,7 +413,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Override the Vault server version, which is normally determined dynamically from the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vault_version_override VaultProvider#vault_version_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vault_version_override VaultProvider#vault_version_override} --- @@ -814,7 +814,7 @@ The construct id used in the generated config for the VaultProvider to import. The id of the existing VaultProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#import import section} in the documentation of this resource for the id to use --- @@ -1646,10 +1646,10 @@ VaultProviderAuthLogin.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. | -| method | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. | +| method | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. | | namespace | java.lang.String | The authentication engine's namespace. Conflicts with use_root_namespace. | -| parameters | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. | +| parameters | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. | | useRootNamespace | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Authenticate to the root Vault namespace. Conflicts with namespace. | --- @@ -1662,7 +1662,7 @@ public java.lang.String getPath(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. --- @@ -1674,7 +1674,7 @@ public java.lang.String getMethod(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. --- @@ -1688,7 +1688,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1700,7 +1700,7 @@ public java.util.Map getParameters(); - *Type:* java.util.Map -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. --- @@ -1714,7 +1714,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1779,7 +1779,7 @@ public java.lang.String getRole(); The Vault role to use when logging into Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -1793,7 +1793,7 @@ public java.lang.String getAwsAccessKeyId(); The AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} --- @@ -1807,7 +1807,7 @@ public java.lang.String getAwsIamEndpoint(); The IAM endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} --- @@ -1821,7 +1821,7 @@ public java.lang.String getAwsProfile(); The name of the AWS profile. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_profile VaultProvider#aws_profile} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_profile VaultProvider#aws_profile} --- @@ -1835,7 +1835,7 @@ public java.lang.String getAwsRegion(); The AWS region. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_region VaultProvider#aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_region VaultProvider#aws_region} --- @@ -1849,7 +1849,7 @@ public java.lang.String getAwsRoleArn(); The ARN of the AWS Role to assume.Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_arn VaultProvider#aws_role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_arn VaultProvider#aws_role_arn} --- @@ -1863,7 +1863,7 @@ public java.lang.String getAwsRoleSessionName(); Specifies the name to attach to the AWS role session. Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} --- @@ -1877,7 +1877,7 @@ public java.lang.String getAwsSecretAccessKey(); The AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} --- @@ -1891,7 +1891,7 @@ public java.lang.String getAwsSessionToken(); The AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_session_token VaultProvider#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_session_token VaultProvider#aws_session_token} --- @@ -1905,7 +1905,7 @@ public java.lang.String getAwsSharedCredentialsFile(); Path to the AWS shared credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} --- @@ -1919,7 +1919,7 @@ public java.lang.String getAwsStsEndpoint(); The STS endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} --- @@ -1933,7 +1933,7 @@ public java.lang.String getAwsWebIdentityTokenFile(); Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} --- @@ -1947,7 +1947,7 @@ public java.lang.String getHeaderValue(); The Vault header value to include in the STS signing request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#header_value VaultProvider#header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#header_value VaultProvider#header_value} --- @@ -1961,7 +1961,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1975,7 +1975,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1989,7 +1989,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2046,7 +2046,7 @@ public java.lang.String getResourceGroupName(); The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#resource_group_name VaultProvider#resource_group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#resource_group_name VaultProvider#resource_group_name} --- @@ -2060,7 +2060,7 @@ public java.lang.String getRole(); Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2074,7 +2074,7 @@ public java.lang.String getSubscriptionId(); The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#subscription_id VaultProvider#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#subscription_id VaultProvider#subscription_id} --- @@ -2088,7 +2088,7 @@ public java.lang.String getClientId(); The identity's client ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_id VaultProvider#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_id VaultProvider#client_id} --- @@ -2102,7 +2102,7 @@ public java.lang.String getJwt(); A signed JSON Web Token. If not specified on will be created automatically. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2116,7 +2116,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2130,7 +2130,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2144,7 +2144,7 @@ public java.lang.String getScope(); The scopes to include in the token request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#scope VaultProvider#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#scope VaultProvider#scope} --- @@ -2158,7 +2158,7 @@ public java.lang.String getTenantId(); Provides the tenant ID to use in a multi-tenant authentication scenario. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tenant_id VaultProvider#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tenant_id VaultProvider#tenant_id} --- @@ -2172,7 +2172,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2188,7 +2188,7 @@ The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vm_name VaultProvider#vm_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vm_name VaultProvider#vm_name} --- @@ -2204,7 +2204,7 @@ The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vmss_name VaultProvider#vmss_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vmss_name VaultProvider#vmss_name} --- @@ -2249,7 +2249,7 @@ public java.lang.String getCertFile(); Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -2263,7 +2263,7 @@ public java.lang.String getKeyFile(); Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -2277,7 +2277,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2291,7 +2291,7 @@ public java.lang.String getName(); Name of the certificate's role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -2305,7 +2305,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2319,7 +2319,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2366,7 +2366,7 @@ public java.lang.String getRole(); Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2380,7 +2380,7 @@ public java.lang.String getCredentials(); Path to the Google Cloud credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#credentials VaultProvider#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#credentials VaultProvider#credentials} --- @@ -2394,7 +2394,7 @@ public java.lang.String getJwt(); A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2408,7 +2408,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2422,7 +2422,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2436,7 +2436,7 @@ public java.lang.String getServiceAccount(); IAM service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service_account VaultProvider#service_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service_account VaultProvider#service_account} --- @@ -2450,7 +2450,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2493,7 +2493,7 @@ public java.lang.String getJwt(); A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2507,7 +2507,7 @@ public java.lang.String getRole(); Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2521,7 +2521,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2535,7 +2535,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2549,7 +2549,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2606,7 +2606,7 @@ public java.lang.Object getDisableFastNegotiation(); Disable the Kerberos FAST negotiation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} --- @@ -2620,7 +2620,7 @@ public java.lang.String getKeytabPath(); The Kerberos keytab file containing the entry of the login entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#keytab_path VaultProvider#keytab_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#keytab_path VaultProvider#keytab_path} --- @@ -2634,7 +2634,7 @@ public java.lang.String getKrb5ConfPath(); A valid Kerberos configuration file e.g. /etc/krb5.conf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#krb5conf_path VaultProvider#krb5conf_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#krb5conf_path VaultProvider#krb5conf_path} --- @@ -2648,7 +2648,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2662,7 +2662,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2676,7 +2676,7 @@ public java.lang.String getRealm(); The Kerberos server's authoritative authentication domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#realm VaultProvider#realm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#realm VaultProvider#realm} --- @@ -2690,7 +2690,7 @@ public java.lang.Object getRemoveInstanceName(); Strip the host from the username found in the keytab. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#remove_instance_name VaultProvider#remove_instance_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#remove_instance_name VaultProvider#remove_instance_name} --- @@ -2704,7 +2704,7 @@ public java.lang.String getService(); The service principle name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service VaultProvider#service} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service VaultProvider#service} --- @@ -2718,7 +2718,7 @@ public java.lang.String getToken(); Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -2732,7 +2732,7 @@ public java.lang.String getUsername(); The username to login into Kerberos with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2746,7 +2746,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2789,7 +2789,7 @@ public java.lang.String getAuthType(); Authentication type to use when getting OCI credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_type VaultProvider#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_type VaultProvider#auth_type} --- @@ -2803,7 +2803,7 @@ public java.lang.String getRole(); Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2817,7 +2817,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2831,7 +2831,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2845,7 +2845,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2890,7 +2890,7 @@ public java.lang.String getRole(); Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2904,7 +2904,7 @@ public java.lang.String getCallbackAddress(); The callback address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_address VaultProvider#callback_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_address VaultProvider#callback_address} --- @@ -2918,7 +2918,7 @@ public java.lang.String getCallbackListenerAddress(); The callback listener's address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_listener_address VaultProvider#callback_listener_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_listener_address VaultProvider#callback_listener_address} --- @@ -2932,7 +2932,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2946,7 +2946,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2960,7 +2960,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -3003,7 +3003,7 @@ public java.lang.String getPassword(); The Radius password for username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -3017,7 +3017,7 @@ public java.lang.String getUsername(); The Radius username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -3031,7 +3031,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -3045,7 +3045,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3059,7 +3059,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -3098,7 +3098,7 @@ public java.lang.String getFilename(); The name of a file containing a single line that is a valid Vault token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#filename VaultProvider#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#filename VaultProvider#filename} --- @@ -3112,7 +3112,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3126,7 +3126,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -3171,7 +3171,7 @@ public java.lang.String getUsername(); Login with username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -3185,7 +3185,7 @@ public java.lang.String getMount(); The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -3199,7 +3199,7 @@ public java.lang.String getNamespace(); The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3213,7 +3213,7 @@ public java.lang.String getPassword(); Login with password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -3227,7 +3227,7 @@ public java.lang.String getPasswordFile(); Login with password from a file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password_file VaultProvider#password_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password_file VaultProvider#password_file} --- @@ -3241,7 +3241,7 @@ public java.lang.Object getUseRootNamespace(); Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -3277,7 +3277,7 @@ public java.lang.String getCertFile(); Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -3291,7 +3291,7 @@ public java.lang.String getKeyFile(); Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -3390,7 +3390,7 @@ public java.lang.String getAddress(); URL of the root of the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#address VaultProvider#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#address VaultProvider#address} --- @@ -3404,7 +3404,7 @@ public java.lang.String getAddAddressToEnv(); If true, adds the value of the `address` argument to the Terraform process environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#add_address_to_env VaultProvider#add_address_to_env} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#add_address_to_env VaultProvider#add_address_to_env} --- @@ -3418,7 +3418,7 @@ public java.lang.String getAlias(); Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#alias VaultProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#alias VaultProvider#alias} --- @@ -3432,7 +3432,7 @@ public VaultProviderAuthLogin getAuthLogin(); auth_login block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login VaultProvider#auth_login} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login VaultProvider#auth_login} --- @@ -3446,7 +3446,7 @@ public VaultProviderAuthLoginAws getAuthLoginAws(); auth_login_aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_aws VaultProvider#auth_login_aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_aws VaultProvider#auth_login_aws} --- @@ -3460,7 +3460,7 @@ public VaultProviderAuthLoginAzure getAuthLoginAzure(); auth_login_azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_azure VaultProvider#auth_login_azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_azure VaultProvider#auth_login_azure} --- @@ -3474,7 +3474,7 @@ public VaultProviderAuthLoginCert getAuthLoginCert(); auth_login_cert block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_cert VaultProvider#auth_login_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_cert VaultProvider#auth_login_cert} --- @@ -3488,7 +3488,7 @@ public VaultProviderAuthLoginGcp getAuthLoginGcp(); auth_login_gcp block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} --- @@ -3502,7 +3502,7 @@ public VaultProviderAuthLoginJwt getAuthLoginJwt(); auth_login_jwt block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} --- @@ -3516,7 +3516,7 @@ public VaultProviderAuthLoginKerberos getAuthLoginKerberos(); auth_login_kerberos block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} --- @@ -3530,7 +3530,7 @@ public VaultProviderAuthLoginOci getAuthLoginOci(); auth_login_oci block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oci VaultProvider#auth_login_oci} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oci VaultProvider#auth_login_oci} --- @@ -3544,7 +3544,7 @@ public VaultProviderAuthLoginOidc getAuthLoginOidc(); auth_login_oidc block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} --- @@ -3558,7 +3558,7 @@ public VaultProviderAuthLoginRadius getAuthLoginRadius(); auth_login_radius block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_radius VaultProvider#auth_login_radius} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_radius VaultProvider#auth_login_radius} --- @@ -3572,7 +3572,7 @@ public VaultProviderAuthLoginTokenFile getAuthLoginTokenFile(); auth_login_token_file block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} --- @@ -3586,7 +3586,7 @@ public VaultProviderAuthLoginUserpass getAuthLoginUserpass(); auth_login_userpass block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} --- @@ -3600,7 +3600,7 @@ public java.lang.String getCaCertDir(); Path to directory containing CA certificate files to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} --- @@ -3614,7 +3614,7 @@ public java.lang.String getCaCertFile(); Path to a CA certificate file to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_file VaultProvider#ca_cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_file VaultProvider#ca_cert_file} --- @@ -3628,7 +3628,7 @@ public VaultProviderClientAuth getClientAuth(); client_auth block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_auth VaultProvider#client_auth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_auth VaultProvider#client_auth} --- @@ -3642,7 +3642,7 @@ public java.lang.Object getHeaders(); headers block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#headers VaultProvider#headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#headers VaultProvider#headers} --- @@ -3656,7 +3656,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum TTL for secret leases requested by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} --- @@ -3670,7 +3670,7 @@ public java.lang.Number getMaxRetries(); Maximum number of retries when a 5xx error code is encountered. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries VaultProvider#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries VaultProvider#max_retries} --- @@ -3684,7 +3684,7 @@ public java.lang.Number getMaxRetriesCcc(); Maximum number of retries for Client Controlled Consistency related operations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} --- @@ -3698,7 +3698,7 @@ public java.lang.String getNamespace(); The namespace to use. Available only for Vault Enterprise. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3712,7 +3712,7 @@ public java.lang.Object getSetNamespaceFromToken(); In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} --- @@ -3726,7 +3726,7 @@ public java.lang.Object getSkipChildToken(); Set this to true to prevent the creation of ephemeral child token used by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_child_token VaultProvider#skip_child_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_child_token VaultProvider#skip_child_token} --- @@ -3740,7 +3740,7 @@ public java.lang.Object getSkipGetVaultVersion(); Skip the dynamic fetching of the Vault server version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} --- @@ -3754,7 +3754,7 @@ public java.lang.Object getSkipTlsVerify(); Set this to true only if the target Vault server is an insecure development instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} --- @@ -3768,7 +3768,7 @@ public java.lang.String getTlsServerName(); Name to use as the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tls_server_name VaultProvider#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tls_server_name VaultProvider#tls_server_name} --- @@ -3782,7 +3782,7 @@ public java.lang.String getToken(); Token to use to authenticate to Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -3796,7 +3796,7 @@ public java.lang.String getTokenName(); Token name to use for creating the Vault child token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token_name VaultProvider#token_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token_name VaultProvider#token_name} --- @@ -3810,7 +3810,7 @@ public java.lang.String getVaultVersionOverride(); Override the Vault server version, which is normally determined dynamically from the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vault_version_override VaultProvider#vault_version_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vault_version_override VaultProvider#vault_version_override} --- @@ -3846,7 +3846,7 @@ public java.lang.String getName(); The header name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -3860,7 +3860,7 @@ public java.lang.String getValue(); The header value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#value VaultProvider#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#value VaultProvider#value} --- diff --git a/docs/provider.python.md b/docs/provider.python.md index b39913aa..b6a2517f 100644 --- a/docs/provider.python.md +++ b/docs/provider.python.md @@ -4,7 +4,7 @@ ### VaultProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs vault}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs vault}. #### Initializers @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope URL of the root of the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#address VaultProvider#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#address VaultProvider#address} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, adds the value of the `address` argument to the Terraform process environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#add_address_to_env VaultProvider#add_address_to_env} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#add_address_to_env VaultProvider#add_address_to_env} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#alias VaultProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#alias VaultProvider#alias} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login VaultProvider#auth_login} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login VaultProvider#auth_login} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_aws VaultProvider#auth_login_aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_aws VaultProvider#auth_login_aws} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_azure VaultProvider#auth_login_azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_azure VaultProvider#auth_login_azure} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_cert block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_cert VaultProvider#auth_login_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_cert VaultProvider#auth_login_cert} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_gcp block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_jwt block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_kerberos block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_oci block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oci VaultProvider#auth_login_oci} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oci VaultProvider#auth_login_oci} --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_oidc block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} --- @@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_radius block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_radius VaultProvider#auth_login_radius} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_radius VaultProvider#auth_login_radius} --- @@ -240,7 +240,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_token_file block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} --- @@ -250,7 +250,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi auth_login_userpass block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} --- @@ -260,7 +260,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to directory containing CA certificate files to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} --- @@ -270,7 +270,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to a CA certificate file to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_file VaultProvider#ca_cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_file VaultProvider#ca_cert_file} --- @@ -280,7 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi client_auth block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_auth VaultProvider#client_auth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_auth VaultProvider#client_auth} --- @@ -290,7 +290,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi headers block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#headers VaultProvider#headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#headers VaultProvider#headers} --- @@ -300,7 +300,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TTL for secret leases requested by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} --- @@ -310,7 +310,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of retries when a 5xx error code is encountered. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries VaultProvider#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries VaultProvider#max_retries} --- @@ -320,7 +320,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of retries for Client Controlled Consistency related operations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} --- @@ -330,7 +330,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The namespace to use. Available only for Vault Enterprise. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -340,7 +340,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} --- @@ -350,7 +350,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set this to true to prevent the creation of ephemeral child token used by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_child_token VaultProvider#skip_child_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_child_token VaultProvider#skip_child_token} --- @@ -360,7 +360,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Skip the dynamic fetching of the Vault server version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} --- @@ -370,7 +370,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set this to true only if the target Vault server is an insecure development instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} --- @@ -380,7 +380,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name to use as the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tls_server_name VaultProvider#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tls_server_name VaultProvider#tls_server_name} --- @@ -390,7 +390,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Token to use to authenticate to Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -400,7 +400,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Token name to use for creating the Vault child token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token_name VaultProvider#token_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token_name VaultProvider#token_name} --- @@ -410,7 +410,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Override the Vault server version, which is normally determined dynamically from the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vault_version_override VaultProvider#vault_version_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vault_version_override VaultProvider#vault_version_override} --- @@ -827,7 +827,7 @@ The construct id used in the generated config for the VaultProvider to import. The id of the existing VaultProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#import import section} in the documentation of this resource for the id to use --- @@ -1658,10 +1658,10 @@ provider.VaultProviderAuthLogin( | **Name** | **Type** | **Description** | | --- | --- | --- | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. | -| method | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. | +| method | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. | | namespace | str | The authentication engine's namespace. Conflicts with use_root_namespace. | -| parameters | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. | +| parameters | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. | | use_root_namespace | typing.Union[bool, cdktf.IResolvable] | Authenticate to the root Vault namespace. Conflicts with namespace. | --- @@ -1674,7 +1674,7 @@ path: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. --- @@ -1686,7 +1686,7 @@ method: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. --- @@ -1700,7 +1700,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1712,7 +1712,7 @@ parameters: typing.Mapping[str] - *Type:* typing.Mapping[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. --- @@ -1726,7 +1726,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1790,7 +1790,7 @@ role: str The Vault role to use when logging into Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -1804,7 +1804,7 @@ aws_access_key_id: str The AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} --- @@ -1818,7 +1818,7 @@ aws_iam_endpoint: str The IAM endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} --- @@ -1832,7 +1832,7 @@ aws_profile: str The name of the AWS profile. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_profile VaultProvider#aws_profile} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_profile VaultProvider#aws_profile} --- @@ -1846,7 +1846,7 @@ aws_region: str The AWS region. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_region VaultProvider#aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_region VaultProvider#aws_region} --- @@ -1860,7 +1860,7 @@ aws_role_arn: str The ARN of the AWS Role to assume.Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_arn VaultProvider#aws_role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_arn VaultProvider#aws_role_arn} --- @@ -1874,7 +1874,7 @@ aws_role_session_name: str Specifies the name to attach to the AWS role session. Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} --- @@ -1888,7 +1888,7 @@ aws_secret_access_key: str The AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} --- @@ -1902,7 +1902,7 @@ aws_session_token: str The AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_session_token VaultProvider#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_session_token VaultProvider#aws_session_token} --- @@ -1916,7 +1916,7 @@ aws_shared_credentials_file: str Path to the AWS shared credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} --- @@ -1930,7 +1930,7 @@ aws_sts_endpoint: str The STS endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} --- @@ -1944,7 +1944,7 @@ aws_web_identity_token_file: str Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} --- @@ -1958,7 +1958,7 @@ header_value: str The Vault header value to include in the STS signing request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#header_value VaultProvider#header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#header_value VaultProvider#header_value} --- @@ -1972,7 +1972,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1986,7 +1986,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2000,7 +2000,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2056,7 +2056,7 @@ resource_group_name: str The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#resource_group_name VaultProvider#resource_group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#resource_group_name VaultProvider#resource_group_name} --- @@ -2070,7 +2070,7 @@ role: str Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2084,7 +2084,7 @@ subscription_id: str The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#subscription_id VaultProvider#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#subscription_id VaultProvider#subscription_id} --- @@ -2098,7 +2098,7 @@ client_id: str The identity's client ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_id VaultProvider#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_id VaultProvider#client_id} --- @@ -2112,7 +2112,7 @@ jwt: str A signed JSON Web Token. If not specified on will be created automatically. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2126,7 +2126,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2140,7 +2140,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2154,7 +2154,7 @@ scope: str The scopes to include in the token request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#scope VaultProvider#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#scope VaultProvider#scope} --- @@ -2168,7 +2168,7 @@ tenant_id: str Provides the tenant ID to use in a multi-tenant authentication scenario. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tenant_id VaultProvider#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tenant_id VaultProvider#tenant_id} --- @@ -2182,7 +2182,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2198,7 +2198,7 @@ The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vm_name VaultProvider#vm_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vm_name VaultProvider#vm_name} --- @@ -2214,7 +2214,7 @@ The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vmss_name VaultProvider#vmss_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vmss_name VaultProvider#vmss_name} --- @@ -2258,7 +2258,7 @@ cert_file: str Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -2272,7 +2272,7 @@ key_file: str Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -2286,7 +2286,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2300,7 +2300,7 @@ name: str Name of the certificate's role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -2314,7 +2314,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2328,7 +2328,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2374,7 +2374,7 @@ role: str Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2388,7 +2388,7 @@ credentials: str Path to the Google Cloud credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#credentials VaultProvider#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#credentials VaultProvider#credentials} --- @@ -2402,7 +2402,7 @@ jwt: str A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2416,7 +2416,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2430,7 +2430,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2444,7 +2444,7 @@ service_account: str IAM service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service_account VaultProvider#service_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service_account VaultProvider#service_account} --- @@ -2458,7 +2458,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2500,7 +2500,7 @@ jwt: str A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2514,7 +2514,7 @@ role: str Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2528,7 +2528,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2542,7 +2542,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2556,7 +2556,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2610,7 +2610,7 @@ disable_fast_negotiation: typing.Union[bool, IResolvable] Disable the Kerberos FAST negotiation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} --- @@ -2624,7 +2624,7 @@ keytab_path: str The Kerberos keytab file containing the entry of the login entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#keytab_path VaultProvider#keytab_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#keytab_path VaultProvider#keytab_path} --- @@ -2638,7 +2638,7 @@ krb5_conf_path: str A valid Kerberos configuration file e.g. /etc/krb5.conf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#krb5conf_path VaultProvider#krb5conf_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#krb5conf_path VaultProvider#krb5conf_path} --- @@ -2652,7 +2652,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2666,7 +2666,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2680,7 +2680,7 @@ realm: str The Kerberos server's authoritative authentication domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#realm VaultProvider#realm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#realm VaultProvider#realm} --- @@ -2694,7 +2694,7 @@ remove_instance_name: typing.Union[bool, IResolvable] Strip the host from the username found in the keytab. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#remove_instance_name VaultProvider#remove_instance_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#remove_instance_name VaultProvider#remove_instance_name} --- @@ -2708,7 +2708,7 @@ service: str The service principle name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service VaultProvider#service} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service VaultProvider#service} --- @@ -2722,7 +2722,7 @@ token: str Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -2736,7 +2736,7 @@ username: str The username to login into Kerberos with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2750,7 +2750,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2792,7 +2792,7 @@ auth_type: str Authentication type to use when getting OCI credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_type VaultProvider#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_type VaultProvider#auth_type} --- @@ -2806,7 +2806,7 @@ role: str Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2820,7 +2820,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2834,7 +2834,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2848,7 +2848,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2892,7 +2892,7 @@ role: str Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2906,7 +2906,7 @@ callback_address: str The callback address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_address VaultProvider#callback_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_address VaultProvider#callback_address} --- @@ -2920,7 +2920,7 @@ callback_listener_address: str The callback listener's address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_listener_address VaultProvider#callback_listener_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_listener_address VaultProvider#callback_listener_address} --- @@ -2934,7 +2934,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2948,7 +2948,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2962,7 +2962,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -3004,7 +3004,7 @@ password: str The Radius password for username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -3018,7 +3018,7 @@ username: str The Radius username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -3032,7 +3032,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -3046,7 +3046,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3060,7 +3060,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -3098,7 +3098,7 @@ filename: str The name of a file containing a single line that is a valid Vault token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#filename VaultProvider#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#filename VaultProvider#filename} --- @@ -3112,7 +3112,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3126,7 +3126,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -3170,7 +3170,7 @@ username: str Login with username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -3184,7 +3184,7 @@ mount: str The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -3198,7 +3198,7 @@ namespace: str The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3212,7 +3212,7 @@ password: str Login with password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -3226,7 +3226,7 @@ password_file: str Login with password from a file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password_file VaultProvider#password_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password_file VaultProvider#password_file} --- @@ -3240,7 +3240,7 @@ use_root_namespace: typing.Union[bool, IResolvable] Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -3276,7 +3276,7 @@ cert_file: str Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -3290,7 +3290,7 @@ key_file: str Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -3384,7 +3384,7 @@ address: str URL of the root of the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#address VaultProvider#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#address VaultProvider#address} --- @@ -3398,7 +3398,7 @@ add_address_to_env: str If true, adds the value of the `address` argument to the Terraform process environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#add_address_to_env VaultProvider#add_address_to_env} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#add_address_to_env VaultProvider#add_address_to_env} --- @@ -3412,7 +3412,7 @@ alias: str Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#alias VaultProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#alias VaultProvider#alias} --- @@ -3426,7 +3426,7 @@ auth_login: VaultProviderAuthLogin auth_login block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login VaultProvider#auth_login} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login VaultProvider#auth_login} --- @@ -3440,7 +3440,7 @@ auth_login_aws: VaultProviderAuthLoginAws auth_login_aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_aws VaultProvider#auth_login_aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_aws VaultProvider#auth_login_aws} --- @@ -3454,7 +3454,7 @@ auth_login_azure: VaultProviderAuthLoginAzure auth_login_azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_azure VaultProvider#auth_login_azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_azure VaultProvider#auth_login_azure} --- @@ -3468,7 +3468,7 @@ auth_login_cert: VaultProviderAuthLoginCert auth_login_cert block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_cert VaultProvider#auth_login_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_cert VaultProvider#auth_login_cert} --- @@ -3482,7 +3482,7 @@ auth_login_gcp: VaultProviderAuthLoginGcp auth_login_gcp block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} --- @@ -3496,7 +3496,7 @@ auth_login_jwt: VaultProviderAuthLoginJwt auth_login_jwt block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} --- @@ -3510,7 +3510,7 @@ auth_login_kerberos: VaultProviderAuthLoginKerberos auth_login_kerberos block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} --- @@ -3524,7 +3524,7 @@ auth_login_oci: VaultProviderAuthLoginOci auth_login_oci block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oci VaultProvider#auth_login_oci} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oci VaultProvider#auth_login_oci} --- @@ -3538,7 +3538,7 @@ auth_login_oidc: VaultProviderAuthLoginOidc auth_login_oidc block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} --- @@ -3552,7 +3552,7 @@ auth_login_radius: VaultProviderAuthLoginRadius auth_login_radius block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_radius VaultProvider#auth_login_radius} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_radius VaultProvider#auth_login_radius} --- @@ -3566,7 +3566,7 @@ auth_login_token_file: VaultProviderAuthLoginTokenFile auth_login_token_file block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} --- @@ -3580,7 +3580,7 @@ auth_login_userpass: VaultProviderAuthLoginUserpass auth_login_userpass block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} --- @@ -3594,7 +3594,7 @@ ca_cert_dir: str Path to directory containing CA certificate files to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} --- @@ -3608,7 +3608,7 @@ ca_cert_file: str Path to a CA certificate file to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_file VaultProvider#ca_cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_file VaultProvider#ca_cert_file} --- @@ -3622,7 +3622,7 @@ client_auth: VaultProviderClientAuth client_auth block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_auth VaultProvider#client_auth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_auth VaultProvider#client_auth} --- @@ -3636,7 +3636,7 @@ headers: typing.Union[IResolvable, typing.List[VaultProviderHeaders]] headers block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#headers VaultProvider#headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#headers VaultProvider#headers} --- @@ -3650,7 +3650,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum TTL for secret leases requested by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} --- @@ -3664,7 +3664,7 @@ max_retries: typing.Union[int, float] Maximum number of retries when a 5xx error code is encountered. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries VaultProvider#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries VaultProvider#max_retries} --- @@ -3678,7 +3678,7 @@ max_retries_ccc: typing.Union[int, float] Maximum number of retries for Client Controlled Consistency related operations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} --- @@ -3692,7 +3692,7 @@ namespace: str The namespace to use. Available only for Vault Enterprise. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3706,7 +3706,7 @@ set_namespace_from_token: typing.Union[bool, IResolvable] In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} --- @@ -3720,7 +3720,7 @@ skip_child_token: typing.Union[bool, IResolvable] Set this to true to prevent the creation of ephemeral child token used by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_child_token VaultProvider#skip_child_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_child_token VaultProvider#skip_child_token} --- @@ -3734,7 +3734,7 @@ skip_get_vault_version: typing.Union[bool, IResolvable] Skip the dynamic fetching of the Vault server version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} --- @@ -3748,7 +3748,7 @@ skip_tls_verify: typing.Union[bool, IResolvable] Set this to true only if the target Vault server is an insecure development instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} --- @@ -3762,7 +3762,7 @@ tls_server_name: str Name to use as the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tls_server_name VaultProvider#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tls_server_name VaultProvider#tls_server_name} --- @@ -3776,7 +3776,7 @@ token: str Token to use to authenticate to Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -3790,7 +3790,7 @@ token_name: str Token name to use for creating the Vault child token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token_name VaultProvider#token_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token_name VaultProvider#token_name} --- @@ -3804,7 +3804,7 @@ vault_version_override: str Override the Vault server version, which is normally determined dynamically from the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vault_version_override VaultProvider#vault_version_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vault_version_override VaultProvider#vault_version_override} --- @@ -3840,7 +3840,7 @@ name: str The header name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -3854,7 +3854,7 @@ value: str The header value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#value VaultProvider#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#value VaultProvider#value} --- diff --git a/docs/provider.typescript.md b/docs/provider.typescript.md index 7110da20..6f627c88 100644 --- a/docs/provider.typescript.md +++ b/docs/provider.typescript.md @@ -4,7 +4,7 @@ ### VaultProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs vault}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs vault}. #### Initializers @@ -443,7 +443,7 @@ The construct id used in the generated config for the VaultProvider to import. The id of the existing VaultProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#import import section} in the documentation of this resource for the id to use --- @@ -1268,10 +1268,10 @@ const vaultProviderAuthLogin: provider.VaultProviderAuthLogin = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. | -| method | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. | +| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. | +| method | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. | | namespace | string | The authentication engine's namespace. Conflicts with use_root_namespace. | -| parameters | {[ key: string ]: string} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. | +| parameters | {[ key: string ]: string} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. | | useRootNamespace | boolean \| cdktf.IResolvable | Authenticate to the root Vault namespace. Conflicts with namespace. | --- @@ -1284,7 +1284,7 @@ public readonly path: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path}. --- @@ -1296,7 +1296,7 @@ public readonly method: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method}. --- @@ -1310,7 +1310,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1322,7 +1322,7 @@ public readonly parameters: {[ key: string ]: string}; - *Type:* {[ key: string ]: string} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters}. --- @@ -1336,7 +1336,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1383,7 +1383,7 @@ public readonly role: string; The Vault role to use when logging into Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -1397,7 +1397,7 @@ public readonly awsAccessKeyId: string; The AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} --- @@ -1411,7 +1411,7 @@ public readonly awsIamEndpoint: string; The IAM endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} --- @@ -1425,7 +1425,7 @@ public readonly awsProfile: string; The name of the AWS profile. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_profile VaultProvider#aws_profile} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_profile VaultProvider#aws_profile} --- @@ -1439,7 +1439,7 @@ public readonly awsRegion: string; The AWS region. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_region VaultProvider#aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_region VaultProvider#aws_region} --- @@ -1453,7 +1453,7 @@ public readonly awsRoleArn: string; The ARN of the AWS Role to assume.Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_arn VaultProvider#aws_role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_arn VaultProvider#aws_role_arn} --- @@ -1467,7 +1467,7 @@ public readonly awsRoleSessionName: string; Specifies the name to attach to the AWS role session. Used during STS AssumeRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} --- @@ -1481,7 +1481,7 @@ public readonly awsSecretAccessKey: string; The AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} --- @@ -1495,7 +1495,7 @@ public readonly awsSessionToken: string; The AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_session_token VaultProvider#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_session_token VaultProvider#aws_session_token} --- @@ -1509,7 +1509,7 @@ public readonly awsSharedCredentialsFile: string; Path to the AWS shared credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} --- @@ -1523,7 +1523,7 @@ public readonly awsStsEndpoint: string; The STS endpoint URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} --- @@ -1537,7 +1537,7 @@ public readonly awsWebIdentityTokenFile: string; Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} --- @@ -1551,7 +1551,7 @@ public readonly headerValue: string; The Vault header value to include in the STS signing request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#header_value VaultProvider#header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#header_value VaultProvider#header_value} --- @@ -1565,7 +1565,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1579,7 +1579,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1593,7 +1593,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1636,7 +1636,7 @@ public readonly resourceGroupName: string; The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#resource_group_name VaultProvider#resource_group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#resource_group_name VaultProvider#resource_group_name} --- @@ -1650,7 +1650,7 @@ public readonly role: string; Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -1664,7 +1664,7 @@ public readonly subscriptionId: string; The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#subscription_id VaultProvider#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#subscription_id VaultProvider#subscription_id} --- @@ -1678,7 +1678,7 @@ public readonly clientId: string; The identity's client ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_id VaultProvider#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_id VaultProvider#client_id} --- @@ -1692,7 +1692,7 @@ public readonly jwt: string; A signed JSON Web Token. If not specified on will be created automatically. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -1706,7 +1706,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1720,7 +1720,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1734,7 +1734,7 @@ public readonly scope: string; The scopes to include in the token request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#scope VaultProvider#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#scope VaultProvider#scope} --- @@ -1748,7 +1748,7 @@ public readonly tenantId: string; Provides the tenant ID to use in a multi-tenant authentication scenario. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tenant_id VaultProvider#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tenant_id VaultProvider#tenant_id} --- @@ -1762,7 +1762,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1778,7 +1778,7 @@ The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vm_name VaultProvider#vm_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vm_name VaultProvider#vm_name} --- @@ -1794,7 +1794,7 @@ The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vmss_name VaultProvider#vmss_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vmss_name VaultProvider#vmss_name} --- @@ -1831,7 +1831,7 @@ public readonly certFile: string; Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -1845,7 +1845,7 @@ public readonly keyFile: string; Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -1859,7 +1859,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1873,7 +1873,7 @@ public readonly name: string; Name of the certificate's role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -1887,7 +1887,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -1901,7 +1901,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -1939,7 +1939,7 @@ public readonly role: string; Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -1953,7 +1953,7 @@ public readonly credentials: string; Path to the Google Cloud credentials file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#credentials VaultProvider#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#credentials VaultProvider#credentials} --- @@ -1967,7 +1967,7 @@ public readonly jwt: string; A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -1981,7 +1981,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -1995,7 +1995,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2009,7 +2009,7 @@ public readonly serviceAccount: string; IAM service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service_account VaultProvider#service_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service_account VaultProvider#service_account} --- @@ -2023,7 +2023,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2059,7 +2059,7 @@ public readonly jwt: string; A signed JSON Web Token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} --- @@ -2073,7 +2073,7 @@ public readonly role: string; Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2087,7 +2087,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2101,7 +2101,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2115,7 +2115,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2157,7 +2157,7 @@ public readonly disableFastNegotiation: boolean | IResolvable; Disable the Kerberos FAST negotiation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} --- @@ -2171,7 +2171,7 @@ public readonly keytabPath: string; The Kerberos keytab file containing the entry of the login entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#keytab_path VaultProvider#keytab_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#keytab_path VaultProvider#keytab_path} --- @@ -2185,7 +2185,7 @@ public readonly krb5ConfPath: string; A valid Kerberos configuration file e.g. /etc/krb5.conf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#krb5conf_path VaultProvider#krb5conf_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#krb5conf_path VaultProvider#krb5conf_path} --- @@ -2199,7 +2199,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2213,7 +2213,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2227,7 +2227,7 @@ public readonly realm: string; The Kerberos server's authoritative authentication domain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#realm VaultProvider#realm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#realm VaultProvider#realm} --- @@ -2241,7 +2241,7 @@ public readonly removeInstanceName: boolean | IResolvable; Strip the host from the username found in the keytab. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#remove_instance_name VaultProvider#remove_instance_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#remove_instance_name VaultProvider#remove_instance_name} --- @@ -2255,7 +2255,7 @@ public readonly service: string; The service principle name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service VaultProvider#service} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service VaultProvider#service} --- @@ -2269,7 +2269,7 @@ public readonly token: string; Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -2283,7 +2283,7 @@ public readonly username: string; The username to login into Kerberos with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2297,7 +2297,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2333,7 +2333,7 @@ public readonly authType: string; Authentication type to use when getting OCI credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_type VaultProvider#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_type VaultProvider#auth_type} --- @@ -2347,7 +2347,7 @@ public readonly role: string; Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2361,7 +2361,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2375,7 +2375,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2389,7 +2389,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2426,7 +2426,7 @@ public readonly role: string; Name of the login role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} --- @@ -2440,7 +2440,7 @@ public readonly callbackAddress: string; The callback address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_address VaultProvider#callback_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_address VaultProvider#callback_address} --- @@ -2454,7 +2454,7 @@ public readonly callbackListenerAddress: string; The callback listener's address. Must be a valid URI without the path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_listener_address VaultProvider#callback_listener_address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_listener_address VaultProvider#callback_listener_address} --- @@ -2468,7 +2468,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2482,7 +2482,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2496,7 +2496,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2532,7 +2532,7 @@ public readonly password: string; The Radius password for username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -2546,7 +2546,7 @@ public readonly username: string; The Radius username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2560,7 +2560,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2574,7 +2574,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2588,7 +2588,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2622,7 +2622,7 @@ public readonly filename: string; The name of a file containing a single line that is a valid Vault token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#filename VaultProvider#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#filename VaultProvider#filename} --- @@ -2636,7 +2636,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2650,7 +2650,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2687,7 +2687,7 @@ public readonly username: string; Login with username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} --- @@ -2701,7 +2701,7 @@ public readonly mount: string; The path where the authentication engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} --- @@ -2715,7 +2715,7 @@ public readonly namespace: string; The authentication engine's namespace. Conflicts with use_root_namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -2729,7 +2729,7 @@ public readonly password: string; Login with password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} --- @@ -2743,7 +2743,7 @@ public readonly passwordFile: string; Login with password from a file. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password_file VaultProvider#password_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password_file VaultProvider#password_file} --- @@ -2757,7 +2757,7 @@ public readonly useRootNamespace: boolean | IResolvable; Authenticate to the root Vault namespace. Conflicts with namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} --- @@ -2790,7 +2790,7 @@ public readonly certFile: string; Path to a file containing the client certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} --- @@ -2804,7 +2804,7 @@ public readonly keyFile: string; Path to a file containing the private key that the certificate was issued for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} --- @@ -2866,7 +2866,7 @@ public readonly address: string; URL of the root of the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#address VaultProvider#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#address VaultProvider#address} --- @@ -2880,7 +2880,7 @@ public readonly addAddressToEnv: string; If true, adds the value of the `address` argument to the Terraform process environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#add_address_to_env VaultProvider#add_address_to_env} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#add_address_to_env VaultProvider#add_address_to_env} --- @@ -2894,7 +2894,7 @@ public readonly alias: string; Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#alias VaultProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#alias VaultProvider#alias} --- @@ -2908,7 +2908,7 @@ public readonly authLogin: VaultProviderAuthLogin; auth_login block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login VaultProvider#auth_login} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login VaultProvider#auth_login} --- @@ -2922,7 +2922,7 @@ public readonly authLoginAws: VaultProviderAuthLoginAws; auth_login_aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_aws VaultProvider#auth_login_aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_aws VaultProvider#auth_login_aws} --- @@ -2936,7 +2936,7 @@ public readonly authLoginAzure: VaultProviderAuthLoginAzure; auth_login_azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_azure VaultProvider#auth_login_azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_azure VaultProvider#auth_login_azure} --- @@ -2950,7 +2950,7 @@ public readonly authLoginCert: VaultProviderAuthLoginCert; auth_login_cert block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_cert VaultProvider#auth_login_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_cert VaultProvider#auth_login_cert} --- @@ -2964,7 +2964,7 @@ public readonly authLoginGcp: VaultProviderAuthLoginGcp; auth_login_gcp block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} --- @@ -2978,7 +2978,7 @@ public readonly authLoginJwt: VaultProviderAuthLoginJwt; auth_login_jwt block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} --- @@ -2992,7 +2992,7 @@ public readonly authLoginKerberos: VaultProviderAuthLoginKerberos; auth_login_kerberos block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} --- @@ -3006,7 +3006,7 @@ public readonly authLoginOci: VaultProviderAuthLoginOci; auth_login_oci block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oci VaultProvider#auth_login_oci} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oci VaultProvider#auth_login_oci} --- @@ -3020,7 +3020,7 @@ public readonly authLoginOidc: VaultProviderAuthLoginOidc; auth_login_oidc block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} --- @@ -3034,7 +3034,7 @@ public readonly authLoginRadius: VaultProviderAuthLoginRadius; auth_login_radius block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_radius VaultProvider#auth_login_radius} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_radius VaultProvider#auth_login_radius} --- @@ -3048,7 +3048,7 @@ public readonly authLoginTokenFile: VaultProviderAuthLoginTokenFile; auth_login_token_file block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} --- @@ -3062,7 +3062,7 @@ public readonly authLoginUserpass: VaultProviderAuthLoginUserpass; auth_login_userpass block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} --- @@ -3076,7 +3076,7 @@ public readonly caCertDir: string; Path to directory containing CA certificate files to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} --- @@ -3090,7 +3090,7 @@ public readonly caCertFile: string; Path to a CA certificate file to validate the server's certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_file VaultProvider#ca_cert_file} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_file VaultProvider#ca_cert_file} --- @@ -3104,7 +3104,7 @@ public readonly clientAuth: VaultProviderClientAuth; client_auth block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_auth VaultProvider#client_auth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_auth VaultProvider#client_auth} --- @@ -3118,7 +3118,7 @@ public readonly headers: IResolvable | VaultProviderHeaders[]; headers block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#headers VaultProvider#headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#headers VaultProvider#headers} --- @@ -3132,7 +3132,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum TTL for secret leases requested by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} --- @@ -3146,7 +3146,7 @@ public readonly maxRetries: number; Maximum number of retries when a 5xx error code is encountered. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries VaultProvider#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries VaultProvider#max_retries} --- @@ -3160,7 +3160,7 @@ public readonly maxRetriesCcc: number; Maximum number of retries for Client Controlled Consistency related operations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} --- @@ -3174,7 +3174,7 @@ public readonly namespace: string; The namespace to use. Available only for Vault Enterprise. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} --- @@ -3188,7 +3188,7 @@ public readonly setNamespaceFromToken: boolean | IResolvable; In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} --- @@ -3202,7 +3202,7 @@ public readonly skipChildToken: boolean | IResolvable; Set this to true to prevent the creation of ephemeral child token used by this provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_child_token VaultProvider#skip_child_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_child_token VaultProvider#skip_child_token} --- @@ -3216,7 +3216,7 @@ public readonly skipGetVaultVersion: boolean | IResolvable; Skip the dynamic fetching of the Vault server version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} --- @@ -3230,7 +3230,7 @@ public readonly skipTlsVerify: boolean | IResolvable; Set this to true only if the target Vault server is an insecure development instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} --- @@ -3244,7 +3244,7 @@ public readonly tlsServerName: string; Name to use as the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tls_server_name VaultProvider#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tls_server_name VaultProvider#tls_server_name} --- @@ -3258,7 +3258,7 @@ public readonly token: string; Token to use to authenticate to Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} --- @@ -3272,7 +3272,7 @@ public readonly tokenName: string; Token name to use for creating the Vault child token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token_name VaultProvider#token_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token_name VaultProvider#token_name} --- @@ -3286,7 +3286,7 @@ public readonly vaultVersionOverride: string; Override the Vault server version, which is normally determined dynamically from the target Vault server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vault_version_override VaultProvider#vault_version_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vault_version_override VaultProvider#vault_version_override} --- @@ -3319,7 +3319,7 @@ public readonly name: string; The header name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} --- @@ -3333,7 +3333,7 @@ public readonly value: string; The header value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#value VaultProvider#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#value VaultProvider#value} --- diff --git a/docs/quotaLeaseCount.csharp.md b/docs/quotaLeaseCount.csharp.md index f5c31056..f1e84b68 100644 --- a/docs/quotaLeaseCount.csharp.md +++ b/docs/quotaLeaseCount.csharp.md @@ -4,7 +4,7 @@ ### QuotaLeaseCount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count vault_quota_lease_count}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count vault_quota_lease_count}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the QuotaLeaseCount to import. The id of the existing QuotaLeaseCount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use --- @@ -859,7 +859,7 @@ new QuotaLeaseCountConfig { | Provisioners | object[] | *No description.* | | MaxLeases | double | The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. | | Name | string | The name of the quota. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. | | Role | string | If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. | @@ -946,7 +946,7 @@ public double MaxLeases { get; set; } The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} --- @@ -960,7 +960,7 @@ public string Name { get; set; } The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} --- @@ -972,7 +972,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} --- @@ -1003,7 +1003,7 @@ public string Path { get; set; } Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} --- @@ -1017,7 +1017,7 @@ public string Role { get; set; } If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} --- diff --git a/docs/quotaLeaseCount.go.md b/docs/quotaLeaseCount.go.md index eae02ef2..ba53e431 100644 --- a/docs/quotaLeaseCount.go.md +++ b/docs/quotaLeaseCount.go.md @@ -4,12 +4,12 @@ ### QuotaLeaseCount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count vault_quota_lease_count}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count vault_quota_lease_count}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaleasecount" quotaleasecount.NewQuotaLeaseCount(scope Construct, id *string, config QuotaLeaseCountConfig) QuotaLeaseCount ``` @@ -406,7 +406,7 @@ func ResetRole() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaleasecount" quotaleasecount.QuotaLeaseCount_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaleasecount" quotaleasecount.QuotaLeaseCount_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ quotaleasecount.QuotaLeaseCount_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaleasecount" quotaleasecount.QuotaLeaseCount_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ quotaleasecount.QuotaLeaseCount_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaleasecount" quotaleasecount.QuotaLeaseCount_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the QuotaLeaseCount to import. The id of the existing QuotaLeaseCount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use --- @@ -827,7 +827,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaleasecount" "aleasecount.QuotaLeaseCountConfig { Connection: interface{}, @@ -859,7 +859,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaleasecount" | Provisioners | *[]interface{} | *No description.* | | MaxLeases | *f64 | The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. | | Name | *string | The name of the quota. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. | | Role | *string | If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. | @@ -946,7 +946,7 @@ MaxLeases *f64 The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} --- @@ -960,7 +960,7 @@ Name *string The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} --- @@ -972,7 +972,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} --- @@ -1003,7 +1003,7 @@ Path *string Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} --- @@ -1017,7 +1017,7 @@ Role *string If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} --- diff --git a/docs/quotaLeaseCount.java.md b/docs/quotaLeaseCount.java.md index 6909f985..09274444 100644 --- a/docs/quotaLeaseCount.java.md +++ b/docs/quotaLeaseCount.java.md @@ -4,7 +4,7 @@ ### QuotaLeaseCount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count vault_quota_lease_count}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count vault_quota_lease_count}. #### Initializers @@ -45,7 +45,7 @@ QuotaLeaseCount.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | maxLeases | java.lang.Number | The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. | | name | java.lang.String | The name of the quota. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. | | role | java.lang.String | If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -149,7 +149,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} --- @@ -624,7 +624,7 @@ The construct id used in the generated config for the QuotaLeaseCount to import. The id of the existing QuotaLeaseCount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use --- @@ -992,7 +992,7 @@ QuotaLeaseCountConfig.builder() | provisioners | java.util.List | *No description.* | | maxLeases | java.lang.Number | The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. | | name | java.lang.String | The name of the quota. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. | | role | java.lang.String | If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. | @@ -1079,7 +1079,7 @@ public java.lang.Number getMaxLeases(); The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} --- @@ -1093,7 +1093,7 @@ public java.lang.String getName(); The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} --- @@ -1105,7 +1105,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1122,7 +1122,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} --- @@ -1136,7 +1136,7 @@ public java.lang.String getPath(); Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} --- @@ -1150,7 +1150,7 @@ public java.lang.String getRole(); If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} --- diff --git a/docs/quotaLeaseCount.python.md b/docs/quotaLeaseCount.python.md index d82b5925..4037c3ec 100644 --- a/docs/quotaLeaseCount.python.md +++ b/docs/quotaLeaseCount.python.md @@ -4,7 +4,7 @@ ### QuotaLeaseCount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count vault_quota_lease_count}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count vault_quota_lease_count}. #### Initializers @@ -43,7 +43,7 @@ quotaLeaseCount.QuotaLeaseCount( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | max_leases | typing.Union[int, float] | The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. | | name | str | The name of the quota. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. | | role | str | If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} --- @@ -668,7 +668,7 @@ The construct id used in the generated config for the QuotaLeaseCount to import. The id of the existing QuotaLeaseCount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use --- @@ -1032,7 +1032,7 @@ quotaLeaseCount.QuotaLeaseCountConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | max_leases | typing.Union[int, float] | The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. | | name | str | The name of the quota. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. | | role | str | If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. | @@ -1119,7 +1119,7 @@ max_leases: typing.Union[int, float] The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} --- @@ -1133,7 +1133,7 @@ name: str The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} --- @@ -1145,7 +1145,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1162,7 +1162,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} --- @@ -1176,7 +1176,7 @@ path: str Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} --- @@ -1190,7 +1190,7 @@ role: str If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} --- diff --git a/docs/quotaLeaseCount.typescript.md b/docs/quotaLeaseCount.typescript.md index 39e2183a..7618e6d6 100644 --- a/docs/quotaLeaseCount.typescript.md +++ b/docs/quotaLeaseCount.typescript.md @@ -4,7 +4,7 @@ ### QuotaLeaseCount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count vault_quota_lease_count}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count vault_quota_lease_count}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the QuotaLeaseCount to import. The id of the existing QuotaLeaseCount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use --- @@ -845,7 +845,7 @@ const quotaLeaseCountConfig: quotaLeaseCount.QuotaLeaseCountConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | maxLeases | number | The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. | | name | string | The name of the quota. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. | | role | string | If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. | @@ -932,7 +932,7 @@ public readonly maxLeases: number; The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} --- @@ -946,7 +946,7 @@ public readonly name: string; The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} --- @@ -958,7 +958,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -975,7 +975,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} --- @@ -989,7 +989,7 @@ public readonly path: string; Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} --- @@ -1003,7 +1003,7 @@ public readonly role: string; If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} --- diff --git a/docs/quotaRateLimit.csharp.md b/docs/quotaRateLimit.csharp.md index 123b08ee..8bbdc6b6 100644 --- a/docs/quotaRateLimit.csharp.md +++ b/docs/quotaRateLimit.csharp.md @@ -4,7 +4,7 @@ ### QuotaRateLimit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the QuotaRateLimit to import. The id of the existing QuotaRateLimit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use --- @@ -920,7 +920,7 @@ new QuotaRateLimitConfig { | Name | string | The name of the quota. | | Rate | double | The maximum number of requests at any given second to be allowed by the quota rule. | | BlockInterval | double | If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | | Interval | double | The duration in seconds to enforce rate limiting for. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. | @@ -1008,7 +1008,7 @@ public string Name { get; set; } The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} --- @@ -1024,7 +1024,7 @@ The maximum number of requests at any given second to be allowed by the quota ru The rate must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} --- @@ -1038,7 +1038,7 @@ public double BlockInterval { get; set; } If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} --- @@ -1050,7 +1050,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1067,7 +1067,7 @@ public double Interval { get; set; } The duration in seconds to enforce rate limiting for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} --- @@ -1081,7 +1081,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} --- @@ -1095,7 +1095,7 @@ public string Path { get; set; } Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} --- @@ -1109,7 +1109,7 @@ public string Role { get; set; } If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} --- diff --git a/docs/quotaRateLimit.go.md b/docs/quotaRateLimit.go.md index fa42aa1d..c8d2bd31 100644 --- a/docs/quotaRateLimit.go.md +++ b/docs/quotaRateLimit.go.md @@ -4,12 +4,12 @@ ### QuotaRateLimit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaratelimit" quotaratelimit.NewQuotaRateLimit(scope Construct, id *string, config QuotaRateLimitConfig) QuotaRateLimit ``` @@ -420,7 +420,7 @@ func ResetRole() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaratelimit" quotaratelimit.QuotaRateLimit_IsConstruct(x interface{}) *bool ``` @@ -452,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaratelimit" quotaratelimit.QuotaRateLimit_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +466,7 @@ quotaratelimit.QuotaRateLimit_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaratelimit" quotaratelimit.QuotaRateLimit_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +480,7 @@ quotaratelimit.QuotaRateLimit_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaratelimit" quotaratelimit.QuotaRateLimit_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +509,7 @@ The construct id used in the generated config for the QuotaRateLimit to import. The id of the existing QuotaRateLimit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use --- @@ -885,7 +885,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/quotaratelimit" "aratelimit.QuotaRateLimitConfig { Connection: interface{}, @@ -920,7 +920,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/quotaratelimit" | Name | *string | The name of the quota. | | Rate | *f64 | The maximum number of requests at any given second to be allowed by the quota rule. | | BlockInterval | *f64 | If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | | Interval | *f64 | The duration in seconds to enforce rate limiting for. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. | @@ -1008,7 +1008,7 @@ Name *string The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} --- @@ -1024,7 +1024,7 @@ The maximum number of requests at any given second to be allowed by the quota ru The rate must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} --- @@ -1038,7 +1038,7 @@ BlockInterval *f64 If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} --- @@ -1050,7 +1050,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1067,7 +1067,7 @@ Interval *f64 The duration in seconds to enforce rate limiting for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} --- @@ -1081,7 +1081,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} --- @@ -1095,7 +1095,7 @@ Path *string Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} --- @@ -1109,7 +1109,7 @@ Role *string If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} --- diff --git a/docs/quotaRateLimit.java.md b/docs/quotaRateLimit.java.md index 51f2039a..08345a58 100644 --- a/docs/quotaRateLimit.java.md +++ b/docs/quotaRateLimit.java.md @@ -4,7 +4,7 @@ ### QuotaRateLimit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. #### Initializers @@ -48,7 +48,7 @@ QuotaRateLimit.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the quota. | | rate | java.lang.Number | The maximum number of requests at any given second to be allowed by the quota rule. | | blockInterval | java.lang.Number | If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | | interval | java.lang.Number | The duration in seconds to enforce rate limiting for. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} --- @@ -134,7 +134,7 @@ The maximum number of requests at any given second to be allowed by the quota ru The rate must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -165,7 +165,7 @@ If you experience problems setting this value it might not be settable. Please t The duration in seconds to enforce rate limiting for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} --- @@ -664,7 +664,7 @@ The construct id used in the generated config for the QuotaRateLimit to import. The id of the existing QuotaRateLimit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use --- @@ -1079,7 +1079,7 @@ QuotaRateLimitConfig.builder() | name | java.lang.String | The name of the quota. | | rate | java.lang.Number | The maximum number of requests at any given second to be allowed by the quota rule. | | blockInterval | java.lang.Number | If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | | interval | java.lang.Number | The duration in seconds to enforce rate limiting for. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. | @@ -1167,7 +1167,7 @@ public java.lang.String getName(); The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} --- @@ -1183,7 +1183,7 @@ The maximum number of requests at any given second to be allowed by the quota ru The rate must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} --- @@ -1197,7 +1197,7 @@ public java.lang.Number getBlockInterval(); If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} --- @@ -1209,7 +1209,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1226,7 +1226,7 @@ public java.lang.Number getInterval(); The duration in seconds to enforce rate limiting for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} --- @@ -1240,7 +1240,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} --- @@ -1254,7 +1254,7 @@ public java.lang.String getPath(); Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} --- @@ -1268,7 +1268,7 @@ public java.lang.String getRole(); If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} --- diff --git a/docs/quotaRateLimit.python.md b/docs/quotaRateLimit.python.md index e478f8cc..19132878 100644 --- a/docs/quotaRateLimit.python.md +++ b/docs/quotaRateLimit.python.md @@ -4,7 +4,7 @@ ### QuotaRateLimit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. #### Initializers @@ -46,7 +46,7 @@ quotaRateLimit.QuotaRateLimit( | name | str | The name of the quota. | | rate | typing.Union[int, float] | The maximum number of requests at any given second to be allowed by the quota rule. | | block_interval | typing.Union[int, float] | If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | | interval | typing.Union[int, float] | The duration in seconds to enforce rate limiting for. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} --- @@ -132,7 +132,7 @@ The maximum number of requests at any given second to be allowed by the quota ru The rate must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ If you experience problems setting this value it might not be settable. Please t The duration in seconds to enforce rate limiting for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} --- @@ -708,7 +708,7 @@ The construct id used in the generated config for the QuotaRateLimit to import. The id of the existing QuotaRateLimit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use --- @@ -1119,7 +1119,7 @@ quotaRateLimit.QuotaRateLimitConfig( | name | str | The name of the quota. | | rate | typing.Union[int, float] | The maximum number of requests at any given second to be allowed by the quota rule. | | block_interval | typing.Union[int, float] | If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | | interval | typing.Union[int, float] | The duration in seconds to enforce rate limiting for. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. | @@ -1207,7 +1207,7 @@ name: str The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} --- @@ -1223,7 +1223,7 @@ The maximum number of requests at any given second to be allowed by the quota ru The rate must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} --- @@ -1237,7 +1237,7 @@ block_interval: typing.Union[int, float] If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} --- @@ -1249,7 +1249,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1266,7 +1266,7 @@ interval: typing.Union[int, float] The duration in seconds to enforce rate limiting for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} --- @@ -1280,7 +1280,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} --- @@ -1294,7 +1294,7 @@ path: str Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} --- @@ -1308,7 +1308,7 @@ role: str If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} --- diff --git a/docs/quotaRateLimit.typescript.md b/docs/quotaRateLimit.typescript.md index 88c0dfd9..1ca1553e 100644 --- a/docs/quotaRateLimit.typescript.md +++ b/docs/quotaRateLimit.typescript.md @@ -4,7 +4,7 @@ ### QuotaRateLimit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit vault_quota_rate_limit}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the QuotaRateLimit to import. The id of the existing QuotaRateLimit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use --- @@ -904,7 +904,7 @@ const quotaRateLimitConfig: quotaRateLimit.QuotaRateLimitConfig = { ... } | name | string | The name of the quota. | | rate | number | The maximum number of requests at any given second to be allowed by the quota rule. | | blockInterval | number | If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. | | interval | number | The duration in seconds to enforce rate limiting for. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. | @@ -992,7 +992,7 @@ public readonly name: string; The name of the quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} --- @@ -1008,7 +1008,7 @@ The maximum number of requests at any given second to be allowed by the quota ru The rate must be positive. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} --- @@ -1022,7 +1022,7 @@ public readonly blockInterval: number; If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} --- @@ -1034,7 +1034,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1051,7 +1051,7 @@ public readonly interval: number; The duration in seconds to enforce rate limiting for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} --- @@ -1065,7 +1065,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} --- @@ -1079,7 +1079,7 @@ public readonly path: string; Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} --- @@ -1093,7 +1093,7 @@ public readonly role: string; If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} --- diff --git a/docs/rabbitmqSecretBackend.csharp.md b/docs/rabbitmqSecretBackend.csharp.md index cf530545..2984e007 100644 --- a/docs/rabbitmqSecretBackend.csharp.md +++ b/docs/rabbitmqSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### RabbitmqSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. #### Initializers @@ -537,7 +537,7 @@ The construct id used in the generated config for the RabbitmqSecretBackend to i The id of the existing RabbitmqSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1066,7 +1066,7 @@ new RabbitmqSecretBackendConfig { | DefaultLeaseTtlSeconds | double | Default lease duration for secrets in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for secrets in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | | PasswordPolicy | string | Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. | @@ -1156,7 +1156,7 @@ public string ConnectionUri { get; set; } Specifies the RabbitMQ connection URI. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} --- @@ -1170,7 +1170,7 @@ public string Password { get; set; } Specifies the RabbitMQ management administrator password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} --- @@ -1184,7 +1184,7 @@ public string Username { get; set; } Specifies the RabbitMQ management administrator username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} --- @@ -1198,7 +1198,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} --- @@ -1212,7 +1212,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} --- @@ -1226,7 +1226,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} --- @@ -1238,7 +1238,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1255,7 +1255,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} --- @@ -1269,7 +1269,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} --- @@ -1283,7 +1283,7 @@ public string PasswordPolicy { get; set; } Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} --- @@ -1297,7 +1297,7 @@ public string Path { get; set; } The path of the RabbitMQ Secret Backend where the connection should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} --- @@ -1311,7 +1311,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} --- @@ -1325,7 +1325,7 @@ public object VerifyConnection { get; set; } Specifies whether to verify connection URI, username, and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} --- diff --git a/docs/rabbitmqSecretBackend.go.md b/docs/rabbitmqSecretBackend.go.md index d5729703..2a237c98 100644 --- a/docs/rabbitmqSecretBackend.go.md +++ b/docs/rabbitmqSecretBackend.go.md @@ -4,12 +4,12 @@ ### RabbitmqSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackend" rabbitmqsecretbackend.NewRabbitmqSecretBackend(scope Construct, id *string, config RabbitmqSecretBackendConfig) RabbitmqSecretBackend ``` @@ -448,7 +448,7 @@ func ResetVerifyConnection() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackend" rabbitmqsecretbackend.RabbitmqSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -480,7 +480,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackend" rabbitmqsecretbackend.RabbitmqSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -494,7 +494,7 @@ rabbitmqsecretbackend.RabbitmqSecretBackend_IsTerraformElement(x interface{}) *b ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackend" rabbitmqsecretbackend.RabbitmqSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -508,7 +508,7 @@ rabbitmqsecretbackend.RabbitmqSecretBackend_IsTerraformResource(x interface{}) * ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackend" rabbitmqsecretbackend.RabbitmqSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -537,7 +537,7 @@ The construct id used in the generated config for the RabbitmqSecretBackend to i The id of the existing RabbitmqSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1023,7 +1023,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackend" &rabbitmqsecretbackend.RabbitmqSecretBackendConfig { Connection: interface{}, @@ -1066,7 +1066,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend | DefaultLeaseTtlSeconds | *f64 | Default lease duration for secrets in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for secrets in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | | PasswordPolicy | *string | Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. | @@ -1156,7 +1156,7 @@ ConnectionUri *string Specifies the RabbitMQ connection URI. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} --- @@ -1170,7 +1170,7 @@ Password *string Specifies the RabbitMQ management administrator password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} --- @@ -1184,7 +1184,7 @@ Username *string Specifies the RabbitMQ management administrator username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} --- @@ -1198,7 +1198,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} --- @@ -1212,7 +1212,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} --- @@ -1226,7 +1226,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} --- @@ -1238,7 +1238,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1255,7 +1255,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} --- @@ -1269,7 +1269,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} --- @@ -1283,7 +1283,7 @@ PasswordPolicy *string Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} --- @@ -1297,7 +1297,7 @@ Path *string The path of the RabbitMQ Secret Backend where the connection should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} --- @@ -1311,7 +1311,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} --- @@ -1325,7 +1325,7 @@ VerifyConnection interface{} Specifies whether to verify connection URI, username, and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} --- diff --git a/docs/rabbitmqSecretBackend.java.md b/docs/rabbitmqSecretBackend.java.md index d55a7b54..2d83a2a5 100644 --- a/docs/rabbitmqSecretBackend.java.md +++ b/docs/rabbitmqSecretBackend.java.md @@ -4,7 +4,7 @@ ### RabbitmqSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. #### Initializers @@ -58,7 +58,7 @@ RabbitmqSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | passwordPolicy | java.lang.String | Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. | @@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope Specifies the RabbitMQ connection URI. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the RabbitMQ management administrator password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the RabbitMQ management administrator username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -205,7 +205,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path of the RabbitMQ Secret Backend where the connection should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to verify connection URI, username, and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} --- @@ -752,7 +752,7 @@ The construct id used in the generated config for the RabbitmqSecretBackend to i The id of the existing RabbitmqSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1287,7 +1287,7 @@ RabbitmqSecretBackendConfig.builder() | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | passwordPolicy | java.lang.String | Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. | @@ -1377,7 +1377,7 @@ public java.lang.String getConnectionUri(); Specifies the RabbitMQ connection URI. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} --- @@ -1391,7 +1391,7 @@ public java.lang.String getPassword(); Specifies the RabbitMQ management administrator password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} --- @@ -1405,7 +1405,7 @@ public java.lang.String getUsername(); Specifies the RabbitMQ management administrator username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} --- @@ -1419,7 +1419,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} --- @@ -1433,7 +1433,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} --- @@ -1447,7 +1447,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} --- @@ -1459,7 +1459,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1476,7 +1476,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} --- @@ -1490,7 +1490,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} --- @@ -1504,7 +1504,7 @@ public java.lang.String getPasswordPolicy(); Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} --- @@ -1518,7 +1518,7 @@ public java.lang.String getPath(); The path of the RabbitMQ Secret Backend where the connection should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} --- @@ -1532,7 +1532,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} --- @@ -1546,7 +1546,7 @@ public java.lang.Object getVerifyConnection(); Specifies whether to verify connection URI, username, and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} --- diff --git a/docs/rabbitmqSecretBackend.python.md b/docs/rabbitmqSecretBackend.python.md index 43ab211f..1b000fc5 100644 --- a/docs/rabbitmqSecretBackend.python.md +++ b/docs/rabbitmqSecretBackend.python.md @@ -4,7 +4,7 @@ ### RabbitmqSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. #### Initializers @@ -54,7 +54,7 @@ rabbitmqSecretBackend.RabbitmqSecretBackend( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | | password_policy | str | Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope Specifies the RabbitMQ connection URI. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the RabbitMQ management administrator password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the RabbitMQ management administrator username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path of the RabbitMQ Secret Backend where the connection should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to verify connection URI, username, and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} --- @@ -794,7 +794,7 @@ The construct id used in the generated config for the RabbitmqSecretBackend to i The id of the existing RabbitmqSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1323,7 +1323,7 @@ rabbitmqSecretBackend.RabbitmqSecretBackendConfig( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | | password_policy | str | Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. | @@ -1413,7 +1413,7 @@ connection_uri: str Specifies the RabbitMQ connection URI. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} --- @@ -1427,7 +1427,7 @@ password: str Specifies the RabbitMQ management administrator password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} --- @@ -1441,7 +1441,7 @@ username: str Specifies the RabbitMQ management administrator username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} --- @@ -1455,7 +1455,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} --- @@ -1469,7 +1469,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} --- @@ -1483,7 +1483,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} --- @@ -1495,7 +1495,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1512,7 +1512,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} --- @@ -1526,7 +1526,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} --- @@ -1540,7 +1540,7 @@ password_policy: str Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} --- @@ -1554,7 +1554,7 @@ path: str The path of the RabbitMQ Secret Backend where the connection should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} --- @@ -1568,7 +1568,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} --- @@ -1582,7 +1582,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies whether to verify connection URI, username, and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} --- diff --git a/docs/rabbitmqSecretBackend.typescript.md b/docs/rabbitmqSecretBackend.typescript.md index 9808e032..f7a65021 100644 --- a/docs/rabbitmqSecretBackend.typescript.md +++ b/docs/rabbitmqSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### RabbitmqSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend}. #### Initializers @@ -537,7 +537,7 @@ The construct id used in the generated config for the RabbitmqSecretBackend to i The id of the existing RabbitmqSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1045,7 +1045,7 @@ const rabbitmqSecretBackendConfig: rabbitmqSecretBackend.RabbitmqSecretBackendCo | defaultLeaseTtlSeconds | number | Default lease duration for secrets in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for secrets in seconds. | | namespace | string | Target namespace. (requires Enterprise). | | passwordPolicy | string | Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. | @@ -1135,7 +1135,7 @@ public readonly connectionUri: string; Specifies the RabbitMQ connection URI. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} --- @@ -1149,7 +1149,7 @@ public readonly password: string; Specifies the RabbitMQ management administrator password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} --- @@ -1163,7 +1163,7 @@ public readonly username: string; Specifies the RabbitMQ management administrator username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} --- @@ -1177,7 +1177,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} --- @@ -1191,7 +1191,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} --- @@ -1205,7 +1205,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} --- @@ -1217,7 +1217,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1234,7 +1234,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} --- @@ -1248,7 +1248,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} --- @@ -1262,7 +1262,7 @@ public readonly passwordPolicy: string; Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} --- @@ -1276,7 +1276,7 @@ public readonly path: string; The path of the RabbitMQ Secret Backend where the connection should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} --- @@ -1290,7 +1290,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} --- @@ -1304,7 +1304,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies whether to verify connection URI, username, and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} --- diff --git a/docs/rabbitmqSecretBackendRole.csharp.md b/docs/rabbitmqSecretBackendRole.csharp.md index d1fcdd48..8be85285 100644 --- a/docs/rabbitmqSecretBackendRole.csharp.md +++ b/docs/rabbitmqSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### RabbitmqSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. #### Initializers @@ -528,7 +528,7 @@ The construct id used in the generated config for the RabbitmqSecretBackendRole The id of the existing RabbitmqSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -915,7 +915,7 @@ new RabbitmqSecretBackendRoleConfig { | Provisioners | object[] | *No description.* | | Backend | string | The path of the Rabbitmq Secret Backend the role belongs to. | | Name | string | Unique name for the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Tags | string | Specifies a comma-separated RabbitMQ management tags. | | Vhost | object | vhost block. | @@ -1003,7 +1003,7 @@ public string Backend { get; set; } The path of the Rabbitmq Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} --- @@ -1017,7 +1017,7 @@ public string Name { get; set; } Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} --- @@ -1029,7 +1029,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1046,7 +1046,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} --- @@ -1060,7 +1060,7 @@ public string Tags { get; set; } Specifies a comma-separated RabbitMQ management tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} --- @@ -1074,7 +1074,7 @@ public object Vhost { get; set; } vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1088,7 +1088,7 @@ public object VhostTopic { get; set; } vhost_topic block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} --- @@ -1128,7 +1128,7 @@ public string Configure { get; set; } The configure permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} --- @@ -1142,7 +1142,7 @@ public string Host { get; set; } The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1156,7 +1156,7 @@ public string Read { get; set; } The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1170,7 +1170,7 @@ public string Write { get; set; } The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- @@ -1206,7 +1206,7 @@ public string Host { get; set; } The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1220,7 +1220,7 @@ public object Vhost { get; set; } vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1258,7 +1258,7 @@ public string Read { get; set; } The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1272,7 +1272,7 @@ public string Topic { get; set; } The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} --- @@ -1286,7 +1286,7 @@ public string Write { get; set; } The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- diff --git a/docs/rabbitmqSecretBackendRole.go.md b/docs/rabbitmqSecretBackendRole.go.md index 515fa6a2..0aa3a7ce 100644 --- a/docs/rabbitmqSecretBackendRole.go.md +++ b/docs/rabbitmqSecretBackendRole.go.md @@ -4,12 +4,12 @@ ### RabbitmqSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRole(scope Construct, id *string, config RabbitmqSecretBackendRoleConfig) RabbitmqSecretBackendRole ``` @@ -439,7 +439,7 @@ func ResetVhostTopic() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -471,7 +471,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -485,7 +485,7 @@ rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -499,7 +499,7 @@ rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.RabbitmqSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -528,7 +528,7 @@ The construct id used in the generated config for the RabbitmqSecretBackendRole The id of the existing RabbitmqSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -882,7 +882,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" &rabbitmqsecretbackendrole.RabbitmqSecretBackendRoleConfig { Connection: interface{}, @@ -915,7 +915,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackend | Provisioners | *[]interface{} | *No description.* | | Backend | *string | The path of the Rabbitmq Secret Backend the role belongs to. | | Name | *string | Unique name for the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Tags | *string | Specifies a comma-separated RabbitMQ management tags. | | Vhost | interface{} | vhost block. | @@ -1003,7 +1003,7 @@ Backend *string The path of the Rabbitmq Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} --- @@ -1017,7 +1017,7 @@ Name *string Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} --- @@ -1029,7 +1029,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1046,7 +1046,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} --- @@ -1060,7 +1060,7 @@ Tags *string Specifies a comma-separated RabbitMQ management tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} --- @@ -1074,7 +1074,7 @@ Vhost interface{} vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1088,7 +1088,7 @@ VhostTopic interface{} vhost_topic block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} --- @@ -1097,7 +1097,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" &rabbitmqsecretbackendrole.RabbitmqSecretBackendRoleVhost { Configure: *string, @@ -1128,7 +1128,7 @@ Configure *string The configure permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} --- @@ -1142,7 +1142,7 @@ Host *string The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1156,7 +1156,7 @@ Read *string The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1170,7 +1170,7 @@ Write *string The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- @@ -1179,7 +1179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" &rabbitmqsecretbackendrole.RabbitmqSecretBackendRoleVhostTopic { Host: *string, @@ -1206,7 +1206,7 @@ Host *string The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1220,7 +1220,7 @@ Vhost interface{} vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1229,7 +1229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" &rabbitmqsecretbackendrole.RabbitmqSecretBackendRoleVhostTopicVhost { Read: *string, @@ -1258,7 +1258,7 @@ Read *string The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1272,7 +1272,7 @@ Topic *string The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} --- @@ -1286,7 +1286,7 @@ Write *string The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- @@ -1297,7 +1297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) RabbitmqSecretBackendRoleVhostList ``` @@ -1457,7 +1457,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) RabbitmqSecretBackendRoleVhostOutputReference ``` @@ -1812,7 +1812,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostTopicList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) RabbitmqSecretBackendRoleVhostTopicList ``` @@ -1972,7 +1972,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostTopicOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) RabbitmqSecretBackendRoleVhostTopicOutputReference ``` @@ -2303,7 +2303,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostTopicVhostList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) RabbitmqSecretBackendRoleVhostTopicVhostList ``` @@ -2463,7 +2463,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rabbitmqsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rabbitmqsecretbackendrole" rabbitmqsecretbackendrole.NewRabbitmqSecretBackendRoleVhostTopicVhostOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) RabbitmqSecretBackendRoleVhostTopicVhostOutputReference ``` diff --git a/docs/rabbitmqSecretBackendRole.java.md b/docs/rabbitmqSecretBackendRole.java.md index 9ffb0e45..83aede0c 100644 --- a/docs/rabbitmqSecretBackendRole.java.md +++ b/docs/rabbitmqSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### RabbitmqSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. #### Initializers @@ -48,7 +48,7 @@ RabbitmqSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The path of the Rabbitmq Secret Backend the role belongs to. | | name | java.lang.String | Unique name for the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tags | java.lang.String | Specifies a comma-separated RabbitMQ management tags. | | vhost | com.hashicorp.cdktf.IResolvable OR java.util.List<RabbitmqSecretBackendRoleVhost> | vhost block. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope The path of the Rabbitmq Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a comma-separated RabbitMQ management tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi vhost_topic block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} --- @@ -671,7 +671,7 @@ The construct id used in the generated config for the RabbitmqSecretBackendRole The id of the existing RabbitmqSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1064,7 +1064,7 @@ RabbitmqSecretBackendRoleConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The path of the Rabbitmq Secret Backend the role belongs to. | | name | java.lang.String | Unique name for the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tags | java.lang.String | Specifies a comma-separated RabbitMQ management tags. | | vhost | com.hashicorp.cdktf.IResolvable OR java.util.List<RabbitmqSecretBackendRoleVhost> | vhost block. | @@ -1152,7 +1152,7 @@ public java.lang.String getBackend(); The path of the Rabbitmq Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} --- @@ -1166,7 +1166,7 @@ public java.lang.String getName(); Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} --- @@ -1178,7 +1178,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1195,7 +1195,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} --- @@ -1209,7 +1209,7 @@ public java.lang.String getTags(); Specifies a comma-separated RabbitMQ management tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} --- @@ -1223,7 +1223,7 @@ public java.lang.Object getVhost(); vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1237,7 +1237,7 @@ public java.lang.Object getVhostTopic(); vhost_topic block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} --- @@ -1277,7 +1277,7 @@ public java.lang.String getConfigure(); The configure permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} --- @@ -1291,7 +1291,7 @@ public java.lang.String getHost(); The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1305,7 +1305,7 @@ public java.lang.String getRead(); The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1319,7 +1319,7 @@ public java.lang.String getWrite(); The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- @@ -1356,7 +1356,7 @@ public java.lang.String getHost(); The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1370,7 +1370,7 @@ public java.lang.Object getVhost(); vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1408,7 +1408,7 @@ public java.lang.String getRead(); The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1422,7 +1422,7 @@ public java.lang.String getTopic(); The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} --- @@ -1436,7 +1436,7 @@ public java.lang.String getWrite(); The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- diff --git a/docs/rabbitmqSecretBackendRole.python.md b/docs/rabbitmqSecretBackendRole.python.md index 17852614..7e9f8059 100644 --- a/docs/rabbitmqSecretBackendRole.python.md +++ b/docs/rabbitmqSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### RabbitmqSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. #### Initializers @@ -44,7 +44,7 @@ rabbitmqSecretBackendRole.RabbitmqSecretBackendRole( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The path of the Rabbitmq Secret Backend the role belongs to. | | name | str | Unique name for the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | tags | str | Specifies a comma-separated RabbitMQ management tags. | | vhost | typing.Union[cdktf.IResolvable, typing.List[RabbitmqSecretBackendRoleVhost]] | vhost block. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The path of the Rabbitmq Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -149,7 +149,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a comma-separated RabbitMQ management tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi vhost_topic block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} --- @@ -717,7 +717,7 @@ The construct id used in the generated config for the RabbitmqSecretBackendRole The id of the existing RabbitmqSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1104,7 +1104,7 @@ rabbitmqSecretBackendRole.RabbitmqSecretBackendRoleConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The path of the Rabbitmq Secret Backend the role belongs to. | | name | str | Unique name for the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | tags | str | Specifies a comma-separated RabbitMQ management tags. | | vhost | typing.Union[cdktf.IResolvable, typing.List[RabbitmqSecretBackendRoleVhost]] | vhost block. | @@ -1192,7 +1192,7 @@ backend: str The path of the Rabbitmq Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} --- @@ -1206,7 +1206,7 @@ name: str Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} --- @@ -1218,7 +1218,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1235,7 +1235,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} --- @@ -1249,7 +1249,7 @@ tags: str Specifies a comma-separated RabbitMQ management tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} --- @@ -1263,7 +1263,7 @@ vhost: typing.Union[IResolvable, typing.List[RabbitmqSecretBackendRoleVhost]] vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1277,7 +1277,7 @@ vhost_topic: typing.Union[IResolvable, typing.List[RabbitmqSecretBackendRoleVhos vhost_topic block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} --- @@ -1317,7 +1317,7 @@ configure: str The configure permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} --- @@ -1331,7 +1331,7 @@ host: str The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1345,7 +1345,7 @@ read: str The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1359,7 +1359,7 @@ write: str The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- @@ -1395,7 +1395,7 @@ host: str The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1409,7 +1409,7 @@ vhost: typing.Union[IResolvable, typing.List[RabbitmqSecretBackendRoleVhostTopic vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1447,7 +1447,7 @@ read: str The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1461,7 +1461,7 @@ topic: str The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} --- @@ -1475,7 +1475,7 @@ write: str The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- diff --git a/docs/rabbitmqSecretBackendRole.typescript.md b/docs/rabbitmqSecretBackendRole.typescript.md index 1ad417e3..a1729c28 100644 --- a/docs/rabbitmqSecretBackendRole.typescript.md +++ b/docs/rabbitmqSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### RabbitmqSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role}. #### Initializers @@ -528,7 +528,7 @@ The construct id used in the generated config for the RabbitmqSecretBackendRole The id of the existing RabbitmqSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -900,7 +900,7 @@ const rabbitmqSecretBackendRoleConfig: rabbitmqSecretBackendRole.RabbitmqSecretB | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | The path of the Rabbitmq Secret Backend the role belongs to. | | name | string | Unique name for the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tags | string | Specifies a comma-separated RabbitMQ management tags. | | vhost | cdktf.IResolvable \| RabbitmqSecretBackendRoleVhost[] | vhost block. | @@ -988,7 +988,7 @@ public readonly backend: string; The path of the Rabbitmq Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} --- @@ -1002,7 +1002,7 @@ public readonly name: string; Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} --- @@ -1014,7 +1014,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1031,7 +1031,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} --- @@ -1045,7 +1045,7 @@ public readonly tags: string; Specifies a comma-separated RabbitMQ management tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} --- @@ -1059,7 +1059,7 @@ public readonly vhost: IResolvable | RabbitmqSecretBackendRoleVhost[]; vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1073,7 +1073,7 @@ public readonly vhostTopic: IResolvable | RabbitmqSecretBackendRoleVhostTopic[]; vhost_topic block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} --- @@ -1108,7 +1108,7 @@ public readonly configure: string; The configure permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} --- @@ -1122,7 +1122,7 @@ public readonly host: string; The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1136,7 +1136,7 @@ public readonly read: string; The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1150,7 +1150,7 @@ public readonly write: string; The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- @@ -1183,7 +1183,7 @@ public readonly host: string; The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} --- @@ -1197,7 +1197,7 @@ public readonly vhost: IResolvable | RabbitmqSecretBackendRoleVhostTopicVhost[]; vhost block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} --- @@ -1231,7 +1231,7 @@ public readonly read: string; The read permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} --- @@ -1245,7 +1245,7 @@ public readonly topic: string; The vhost to set permissions for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} --- @@ -1259,7 +1259,7 @@ public readonly write: string; The write permissions for this vhost. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} --- diff --git a/docs/raftAutopilot.csharp.md b/docs/raftAutopilot.csharp.md index 860bd184..1f065b80 100644 --- a/docs/raftAutopilot.csharp.md +++ b/docs/raftAutopilot.csharp.md @@ -4,7 +4,7 @@ ### RaftAutopilot -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot vault_raft_autopilot}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot vault_raft_autopilot}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the RaftAutopilot to import. The id of the existing RaftAutopilot that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use --- @@ -964,7 +964,7 @@ new RaftAutopilotConfig { | CleanupDeadServers | object | Specifies whether to remove dead server nodes periodically or when a new server joins. | | DeadServerLastContactThreshold | string | Limit the amount of time a server can go without leader contact before being considered failed. | | DisableUpgradeMigration | object | Disables automatically upgrading Vault using autopilot. (Enterprise-only). | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | | LastContactThreshold | string | Limit the amount of time a server can go without leader contact before being considered unhealthy. | | MaxTrailingLogs | double | Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. | | MinQuorum | double | Minimum number of servers allowed in a cluster before autopilot can prune dead servers. | @@ -1055,7 +1055,7 @@ Specifies whether to remove dead server nodes periodically or when a new server This requires that min-quorum is also set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} --- @@ -1071,7 +1071,7 @@ Limit the amount of time a server can go without leader contact before being con This only takes effect when cleanup_dead_servers is set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} --- @@ -1085,7 +1085,7 @@ public object DisableUpgradeMigration { get; set; } Disables automatically upgrading Vault using autopilot. (Enterprise-only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} --- @@ -1097,7 +1097,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1114,7 +1114,7 @@ public string LastContactThreshold { get; set; } Limit the amount of time a server can go without leader contact before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} --- @@ -1128,7 +1128,7 @@ public double MaxTrailingLogs { get; set; } Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} --- @@ -1144,7 +1144,7 @@ Minimum number of servers allowed in a cluster before autopilot can prune dead s This should at least be 3. Applicable only for voting nodes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} --- @@ -1158,7 +1158,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} --- @@ -1172,7 +1172,7 @@ public string ServerStabilizationTime { get; set; } Minimum amount of time a server must be stable in the 'healthy' state before being added to the cluster. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} --- diff --git a/docs/raftAutopilot.go.md b/docs/raftAutopilot.go.md index 52e276a5..8ab25265 100644 --- a/docs/raftAutopilot.go.md +++ b/docs/raftAutopilot.go.md @@ -4,12 +4,12 @@ ### RaftAutopilot -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot vault_raft_autopilot}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot vault_raft_autopilot}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftautopilot" raftautopilot.NewRaftAutopilot(scope Construct, id *string, config RaftAutopilotConfig) RaftAutopilot ``` @@ -441,7 +441,7 @@ func ResetServerStabilizationTime() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftautopilot" raftautopilot.RaftAutopilot_IsConstruct(x interface{}) *bool ``` @@ -473,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftautopilot" raftautopilot.RaftAutopilot_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +487,7 @@ raftautopilot.RaftAutopilot_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftautopilot" raftautopilot.RaftAutopilot_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +501,7 @@ raftautopilot.RaftAutopilot_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftautopilot" raftautopilot.RaftAutopilot_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -530,7 +530,7 @@ The construct id used in the generated config for the RaftAutopilot to import. The id of the existing RaftAutopilot that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use --- @@ -928,7 +928,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftautopilot" &raftautopilot.RaftAutopilotConfig { Connection: interface{}, @@ -964,7 +964,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftautopilot" | CleanupDeadServers | interface{} | Specifies whether to remove dead server nodes periodically or when a new server joins. | | DeadServerLastContactThreshold | *string | Limit the amount of time a server can go without leader contact before being considered failed. | | DisableUpgradeMigration | interface{} | Disables automatically upgrading Vault using autopilot. (Enterprise-only). | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | | LastContactThreshold | *string | Limit the amount of time a server can go without leader contact before being considered unhealthy. | | MaxTrailingLogs | *f64 | Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. | | MinQuorum | *f64 | Minimum number of servers allowed in a cluster before autopilot can prune dead servers. | @@ -1055,7 +1055,7 @@ Specifies whether to remove dead server nodes periodically or when a new server This requires that min-quorum is also set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} --- @@ -1071,7 +1071,7 @@ Limit the amount of time a server can go without leader contact before being con This only takes effect when cleanup_dead_servers is set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} --- @@ -1085,7 +1085,7 @@ DisableUpgradeMigration interface{} Disables automatically upgrading Vault using autopilot. (Enterprise-only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} --- @@ -1097,7 +1097,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1114,7 +1114,7 @@ LastContactThreshold *string Limit the amount of time a server can go without leader contact before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} --- @@ -1128,7 +1128,7 @@ MaxTrailingLogs *f64 Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} --- @@ -1144,7 +1144,7 @@ Minimum number of servers allowed in a cluster before autopilot can prune dead s This should at least be 3. Applicable only for voting nodes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} --- @@ -1158,7 +1158,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} --- @@ -1172,7 +1172,7 @@ ServerStabilizationTime *string Minimum amount of time a server must be stable in the 'healthy' state before being added to the cluster. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} --- diff --git a/docs/raftAutopilot.java.md b/docs/raftAutopilot.java.md index f964a060..30862d68 100644 --- a/docs/raftAutopilot.java.md +++ b/docs/raftAutopilot.java.md @@ -4,7 +4,7 @@ ### RaftAutopilot -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot vault_raft_autopilot}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot vault_raft_autopilot}. #### Initializers @@ -51,7 +51,7 @@ RaftAutopilot.Builder.create(Construct scope, java.lang.String id) | cleanupDeadServers | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies whether to remove dead server nodes periodically or when a new server joins. | | deadServerLastContactThreshold | java.lang.String | Limit the amount of time a server can go without leader contact before being considered failed. | | disableUpgradeMigration | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables automatically upgrading Vault using autopilot. (Enterprise-only). | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | | lastContactThreshold | java.lang.String | Limit the amount of time a server can go without leader contact before being considered unhealthy. | | maxTrailingLogs | java.lang.Number | Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. | | minQuorum | java.lang.Number | Minimum number of servers allowed in a cluster before autopilot can prune dead servers. | @@ -128,7 +128,7 @@ Specifies whether to remove dead server nodes periodically or when a new server This requires that min-quorum is also set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} --- @@ -140,7 +140,7 @@ Limit the amount of time a server can go without leader contact before being con This only takes effect when cleanup_dead_servers is set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disables automatically upgrading Vault using autopilot. (Enterprise-only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Limit the amount of time a server can go without leader contact before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} --- @@ -193,7 +193,7 @@ Minimum number of servers allowed in a cluster before autopilot can prune dead s This should at least be 3. Applicable only for voting nodes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum amount of time a server must be stable in the 'healthy' state before being added to the cluster. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} --- @@ -703,7 +703,7 @@ The construct id used in the generated config for the RaftAutopilot to import. The id of the existing RaftAutopilot that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use --- @@ -1143,7 +1143,7 @@ RaftAutopilotConfig.builder() | cleanupDeadServers | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies whether to remove dead server nodes periodically or when a new server joins. | | deadServerLastContactThreshold | java.lang.String | Limit the amount of time a server can go without leader contact before being considered failed. | | disableUpgradeMigration | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables automatically upgrading Vault using autopilot. (Enterprise-only). | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | | lastContactThreshold | java.lang.String | Limit the amount of time a server can go without leader contact before being considered unhealthy. | | maxTrailingLogs | java.lang.Number | Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. | | minQuorum | java.lang.Number | Minimum number of servers allowed in a cluster before autopilot can prune dead servers. | @@ -1234,7 +1234,7 @@ Specifies whether to remove dead server nodes periodically or when a new server This requires that min-quorum is also set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} --- @@ -1250,7 +1250,7 @@ Limit the amount of time a server can go without leader contact before being con This only takes effect when cleanup_dead_servers is set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} --- @@ -1264,7 +1264,7 @@ public java.lang.Object getDisableUpgradeMigration(); Disables automatically upgrading Vault using autopilot. (Enterprise-only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} --- @@ -1276,7 +1276,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1293,7 +1293,7 @@ public java.lang.String getLastContactThreshold(); Limit the amount of time a server can go without leader contact before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} --- @@ -1307,7 +1307,7 @@ public java.lang.Number getMaxTrailingLogs(); Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} --- @@ -1323,7 +1323,7 @@ Minimum number of servers allowed in a cluster before autopilot can prune dead s This should at least be 3. Applicable only for voting nodes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} --- @@ -1337,7 +1337,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} --- @@ -1351,7 +1351,7 @@ public java.lang.String getServerStabilizationTime(); Minimum amount of time a server must be stable in the 'healthy' state before being added to the cluster. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} --- diff --git a/docs/raftAutopilot.python.md b/docs/raftAutopilot.python.md index 8dff000a..d24be39e 100644 --- a/docs/raftAutopilot.python.md +++ b/docs/raftAutopilot.python.md @@ -4,7 +4,7 @@ ### RaftAutopilot -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot vault_raft_autopilot}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot vault_raft_autopilot}. #### Initializers @@ -47,7 +47,7 @@ raftAutopilot.RaftAutopilot( | cleanup_dead_servers | typing.Union[bool, cdktf.IResolvable] | Specifies whether to remove dead server nodes periodically or when a new server joins. | | dead_server_last_contact_threshold | str | Limit the amount of time a server can go without leader contact before being considered failed. | | disable_upgrade_migration | typing.Union[bool, cdktf.IResolvable] | Disables automatically upgrading Vault using autopilot. (Enterprise-only). | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | | last_contact_threshold | str | Limit the amount of time a server can go without leader contact before being considered unhealthy. | | max_trailing_logs | typing.Union[int, float] | Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. | | min_quorum | typing.Union[int, float] | Minimum number of servers allowed in a cluster before autopilot can prune dead servers. | @@ -124,7 +124,7 @@ Specifies whether to remove dead server nodes periodically or when a new server This requires that min-quorum is also set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} --- @@ -136,7 +136,7 @@ Limit the amount of time a server can go without leader contact before being con This only takes effect when cleanup_dead_servers is set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disables automatically upgrading Vault using autopilot. (Enterprise-only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Limit the amount of time a server can go without leader contact before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} --- @@ -189,7 +189,7 @@ Minimum number of servers allowed in a cluster before autopilot can prune dead s This should at least be 3. Applicable only for voting nodes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum amount of time a server must be stable in the 'healthy' state before being added to the cluster. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} --- @@ -745,7 +745,7 @@ The construct id used in the generated config for the RaftAutopilot to import. The id of the existing RaftAutopilot that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use --- @@ -1179,7 +1179,7 @@ raftAutopilot.RaftAutopilotConfig( | cleanup_dead_servers | typing.Union[bool, cdktf.IResolvable] | Specifies whether to remove dead server nodes periodically or when a new server joins. | | dead_server_last_contact_threshold | str | Limit the amount of time a server can go without leader contact before being considered failed. | | disable_upgrade_migration | typing.Union[bool, cdktf.IResolvable] | Disables automatically upgrading Vault using autopilot. (Enterprise-only). | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | | last_contact_threshold | str | Limit the amount of time a server can go without leader contact before being considered unhealthy. | | max_trailing_logs | typing.Union[int, float] | Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. | | min_quorum | typing.Union[int, float] | Minimum number of servers allowed in a cluster before autopilot can prune dead servers. | @@ -1270,7 +1270,7 @@ Specifies whether to remove dead server nodes periodically or when a new server This requires that min-quorum is also set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} --- @@ -1286,7 +1286,7 @@ Limit the amount of time a server can go without leader contact before being con This only takes effect when cleanup_dead_servers is set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} --- @@ -1300,7 +1300,7 @@ disable_upgrade_migration: typing.Union[bool, IResolvable] Disables automatically upgrading Vault using autopilot. (Enterprise-only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} --- @@ -1312,7 +1312,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1329,7 +1329,7 @@ last_contact_threshold: str Limit the amount of time a server can go without leader contact before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} --- @@ -1343,7 +1343,7 @@ max_trailing_logs: typing.Union[int, float] Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} --- @@ -1359,7 +1359,7 @@ Minimum number of servers allowed in a cluster before autopilot can prune dead s This should at least be 3. Applicable only for voting nodes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} --- @@ -1373,7 +1373,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} --- @@ -1387,7 +1387,7 @@ server_stabilization_time: str Minimum amount of time a server must be stable in the 'healthy' state before being added to the cluster. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} --- diff --git a/docs/raftAutopilot.typescript.md b/docs/raftAutopilot.typescript.md index 7bdd5f88..4f0c607b 100644 --- a/docs/raftAutopilot.typescript.md +++ b/docs/raftAutopilot.typescript.md @@ -4,7 +4,7 @@ ### RaftAutopilot -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot vault_raft_autopilot}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot vault_raft_autopilot}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the RaftAutopilot to import. The id of the existing RaftAutopilot that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use --- @@ -947,7 +947,7 @@ const raftAutopilotConfig: raftAutopilot.RaftAutopilotConfig = { ... } | cleanupDeadServers | boolean \| cdktf.IResolvable | Specifies whether to remove dead server nodes periodically or when a new server joins. | | deadServerLastContactThreshold | string | Limit the amount of time a server can go without leader contact before being considered failed. | | disableUpgradeMigration | boolean \| cdktf.IResolvable | Disables automatically upgrading Vault using autopilot. (Enterprise-only). | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. | | lastContactThreshold | string | Limit the amount of time a server can go without leader contact before being considered unhealthy. | | maxTrailingLogs | number | Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. | | minQuorum | number | Minimum number of servers allowed in a cluster before autopilot can prune dead servers. | @@ -1038,7 +1038,7 @@ Specifies whether to remove dead server nodes periodically or when a new server This requires that min-quorum is also set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} --- @@ -1054,7 +1054,7 @@ Limit the amount of time a server can go without leader contact before being con This only takes effect when cleanup_dead_servers is set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} --- @@ -1068,7 +1068,7 @@ public readonly disableUpgradeMigration: boolean | IResolvable; Disables automatically upgrading Vault using autopilot. (Enterprise-only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} --- @@ -1080,7 +1080,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ public readonly lastContactThreshold: string; Limit the amount of time a server can go without leader contact before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} --- @@ -1111,7 +1111,7 @@ public readonly maxTrailingLogs: number; Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} --- @@ -1127,7 +1127,7 @@ Minimum number of servers allowed in a cluster before autopilot can prune dead s This should at least be 3. Applicable only for voting nodes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} --- @@ -1141,7 +1141,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} --- @@ -1155,7 +1155,7 @@ public readonly serverStabilizationTime: string; Minimum amount of time a server must be stable in the 'healthy' state before being added to the cluster. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} --- diff --git a/docs/raftSnapshotAgentConfig.csharp.md b/docs/raftSnapshotAgentConfig.csharp.md index 32d81483..a6dba3f3 100644 --- a/docs/raftSnapshotAgentConfig.csharp.md +++ b/docs/raftSnapshotAgentConfig.csharp.md @@ -4,7 +4,7 @@ ### RaftSnapshotAgentConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. #### Initializers @@ -642,7 +642,7 @@ The construct id used in the generated config for the RaftSnapshotAgentConfig to The id of the existing RaftSnapshotAgentConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use --- @@ -1558,7 +1558,7 @@ new RaftSnapshotAgentConfigConfig { | GoogleEndpoint | string | GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. | | GoogleGcsBucket | string | GCS bucket to write snapshots to. | | GoogleServiceAccountKey | string | Google service account key in JSON format. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | | LocalMaxSpace | double | The maximum space, in bytes, to use for snapshots. | | Namespace | string | Target namespace. (requires Enterprise). | | Retain | double | How many snapshots are to be kept. | @@ -1645,7 +1645,7 @@ public double IntervalSeconds { get; set; } Number of seconds between snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} --- @@ -1659,7 +1659,7 @@ public string Name { get; set; } Name of the snapshot agent configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} --- @@ -1673,7 +1673,7 @@ public string PathPrefix { get; set; } The directory or bucket prefix to to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} --- @@ -1687,7 +1687,7 @@ public string StorageType { get; set; } What storage service to send snapshots to. One of "local", "azure-blob", "aws-s3", or "google-gcs". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} --- @@ -1701,7 +1701,7 @@ public string AwsAccessKeyId { get; set; } AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} --- @@ -1715,7 +1715,7 @@ public string AwsS3Bucket { get; set; } S3 bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} --- @@ -1729,7 +1729,7 @@ public object AwsS3DisableTls { get; set; } Disable TLS for the S3 endpoint. This should only be used for testing purposes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} --- @@ -1743,7 +1743,7 @@ public object AwsS3EnableKms { get; set; } Use KMS to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} --- @@ -1757,7 +1757,7 @@ public string AwsS3Endpoint { get; set; } AWS endpoint. This is typically only set when using a non-AWS S3 implementation like Minio. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} --- @@ -1771,7 +1771,7 @@ public object AwsS3ForcePathStyle { get; set; } Use the endpoint/bucket URL style instead of bucket.endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} --- @@ -1785,7 +1785,7 @@ public string AwsS3KmsKey { get; set; } Use named KMS key, when aws_s3_enable_kms=true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} --- @@ -1799,7 +1799,7 @@ public string AwsS3Region { get; set; } AWS region bucket is in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} --- @@ -1813,7 +1813,7 @@ public object AwsS3ServerSideEncryption { get; set; } Use AES256 to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} --- @@ -1827,7 +1827,7 @@ public string AwsSecretAccessKey { get; set; } AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} --- @@ -1841,7 +1841,7 @@ public string AwsSessionToken { get; set; } AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} --- @@ -1855,7 +1855,7 @@ public string AzureAccountKey { get; set; } Azure account key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} --- @@ -1869,7 +1869,7 @@ public string AzureAccountName { get; set; } Azure account name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} --- @@ -1883,7 +1883,7 @@ public string AzureBlobEnvironment { get; set; } Azure blob environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} --- @@ -1897,7 +1897,7 @@ public string AzureContainerName { get; set; } Azure container name to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} --- @@ -1911,7 +1911,7 @@ public string AzureEndpoint { get; set; } Azure blob storage endpoint. This is typically only set when using a non-Azure implementation like Azurite. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} --- @@ -1925,7 +1925,7 @@ public string FilePrefix { get; set; } The file or object name of snapshot files will start with this string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} --- @@ -1939,7 +1939,7 @@ public object GoogleDisableTls { get; set; } Disable TLS for the GCS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} --- @@ -1953,7 +1953,7 @@ public string GoogleEndpoint { get; set; } GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} --- @@ -1967,7 +1967,7 @@ public string GoogleGcsBucket { get; set; } GCS bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} --- @@ -1981,7 +1981,7 @@ public string GoogleServiceAccountKey { get; set; } Google service account key in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} --- @@ -1993,7 +1993,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2010,7 +2010,7 @@ public double LocalMaxSpace { get; set; } The maximum space, in bytes, to use for snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} --- @@ -2024,7 +2024,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} --- @@ -2038,7 +2038,7 @@ public double Retain { get; set; } How many snapshots are to be kept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} --- diff --git a/docs/raftSnapshotAgentConfig.go.md b/docs/raftSnapshotAgentConfig.go.md index f91a7a29..4c83dfa5 100644 --- a/docs/raftSnapshotAgentConfig.go.md +++ b/docs/raftSnapshotAgentConfig.go.md @@ -4,12 +4,12 @@ ### RaftSnapshotAgentConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftsnapshotagentconfig" raftsnapshotagentconfig.NewRaftSnapshotAgentConfig(scope Construct, id *string, config RaftSnapshotAgentConfigConfig) RaftSnapshotAgentConfig ``` @@ -553,7 +553,7 @@ func ResetRetain() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftsnapshotagentconfig" raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsConstruct(x interface{}) *bool ``` @@ -585,7 +585,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftsnapshotagentconfig" raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsTerraformElement(x interface{}) *bool ``` @@ -599,7 +599,7 @@ raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftsnapshotagentconfig" raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsTerraformResource(x interface{}) *bool ``` @@ -613,7 +613,7 @@ raftsnapshotagentconfig.RaftSnapshotAgentConfig_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftsnapshotagentconfig" raftsnapshotagentconfig.RaftSnapshotAgentConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -642,7 +642,7 @@ The construct id used in the generated config for the RaftSnapshotAgentConfig to The id of the existing RaftSnapshotAgentConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use --- @@ -1480,7 +1480,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/raftsnapshotagentconfig" &raftsnapshotagentconfig.RaftSnapshotAgentConfigConfig { Connection: interface{}, @@ -1558,7 +1558,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/raftsnapshotagentconf | GoogleEndpoint | *string | GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. | | GoogleGcsBucket | *string | GCS bucket to write snapshots to. | | GoogleServiceAccountKey | *string | Google service account key in JSON format. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | | LocalMaxSpace | *f64 | The maximum space, in bytes, to use for snapshots. | | Namespace | *string | Target namespace. (requires Enterprise). | | Retain | *f64 | How many snapshots are to be kept. | @@ -1645,7 +1645,7 @@ IntervalSeconds *f64 Number of seconds between snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} --- @@ -1659,7 +1659,7 @@ Name *string Name of the snapshot agent configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} --- @@ -1673,7 +1673,7 @@ PathPrefix *string The directory or bucket prefix to to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} --- @@ -1687,7 +1687,7 @@ StorageType *string What storage service to send snapshots to. One of "local", "azure-blob", "aws-s3", or "google-gcs". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} --- @@ -1701,7 +1701,7 @@ AwsAccessKeyId *string AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} --- @@ -1715,7 +1715,7 @@ AwsS3Bucket *string S3 bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} --- @@ -1729,7 +1729,7 @@ AwsS3DisableTls interface{} Disable TLS for the S3 endpoint. This should only be used for testing purposes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} --- @@ -1743,7 +1743,7 @@ AwsS3EnableKms interface{} Use KMS to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} --- @@ -1757,7 +1757,7 @@ AwsS3Endpoint *string AWS endpoint. This is typically only set when using a non-AWS S3 implementation like Minio. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} --- @@ -1771,7 +1771,7 @@ AwsS3ForcePathStyle interface{} Use the endpoint/bucket URL style instead of bucket.endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} --- @@ -1785,7 +1785,7 @@ AwsS3KmsKey *string Use named KMS key, when aws_s3_enable_kms=true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} --- @@ -1799,7 +1799,7 @@ AwsS3Region *string AWS region bucket is in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} --- @@ -1813,7 +1813,7 @@ AwsS3ServerSideEncryption interface{} Use AES256 to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} --- @@ -1827,7 +1827,7 @@ AwsSecretAccessKey *string AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} --- @@ -1841,7 +1841,7 @@ AwsSessionToken *string AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} --- @@ -1855,7 +1855,7 @@ AzureAccountKey *string Azure account key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} --- @@ -1869,7 +1869,7 @@ AzureAccountName *string Azure account name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} --- @@ -1883,7 +1883,7 @@ AzureBlobEnvironment *string Azure blob environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} --- @@ -1897,7 +1897,7 @@ AzureContainerName *string Azure container name to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} --- @@ -1911,7 +1911,7 @@ AzureEndpoint *string Azure blob storage endpoint. This is typically only set when using a non-Azure implementation like Azurite. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} --- @@ -1925,7 +1925,7 @@ FilePrefix *string The file or object name of snapshot files will start with this string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} --- @@ -1939,7 +1939,7 @@ GoogleDisableTls interface{} Disable TLS for the GCS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} --- @@ -1953,7 +1953,7 @@ GoogleEndpoint *string GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} --- @@ -1967,7 +1967,7 @@ GoogleGcsBucket *string GCS bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} --- @@ -1981,7 +1981,7 @@ GoogleServiceAccountKey *string Google service account key in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} --- @@ -1993,7 +1993,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2010,7 +2010,7 @@ LocalMaxSpace *f64 The maximum space, in bytes, to use for snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} --- @@ -2024,7 +2024,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} --- @@ -2038,7 +2038,7 @@ Retain *f64 How many snapshots are to be kept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} --- diff --git a/docs/raftSnapshotAgentConfig.java.md b/docs/raftSnapshotAgentConfig.java.md index a310e4df..9044bd6b 100644 --- a/docs/raftSnapshotAgentConfig.java.md +++ b/docs/raftSnapshotAgentConfig.java.md @@ -4,7 +4,7 @@ ### RaftSnapshotAgentConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. #### Initializers @@ -96,7 +96,7 @@ RaftSnapshotAgentConfig.Builder.create(Construct scope, java.lang.String id) | googleEndpoint | java.lang.String | GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. | | googleGcsBucket | java.lang.String | GCS bucket to write snapshots to. | | googleServiceAccountKey | java.lang.String | Google service account key in JSON format. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | | localMaxSpace | java.lang.Number | The maximum space, in bytes, to use for snapshots. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | retain | java.lang.Number | How many snapshots are to be kept. | @@ -169,7 +169,7 @@ Must be unique amongst siblings in the same scope Number of seconds between snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the snapshot agent configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The directory or bucket prefix to to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi What storage service to send snapshots to. One of "local", "azure-blob", "aws-s3", or "google-gcs". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi S3 bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable TLS for the S3 endpoint. This should only be used for testing purposes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use KMS to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} --- @@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS endpoint. This is typically only set when using a non-AWS S3 implementation like Minio. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use the endpoint/bucket URL style instead of bucket.endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} --- @@ -269,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use named KMS key, when aws_s3_enable_kms=true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} --- @@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS region bucket is in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} --- @@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use AES256 to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} --- @@ -299,7 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} --- @@ -309,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} --- @@ -319,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure account key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure account name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure blob environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} --- @@ -349,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure container name to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure blob storage endpoint. This is typically only set when using a non-Azure implementation like Azurite. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} --- @@ -369,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The file or object name of snapshot files will start with this string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} --- @@ -379,7 +379,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable TLS for the GCS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} --- @@ -389,7 +389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} --- @@ -399,7 +399,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi GCS bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} --- @@ -409,7 +409,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Google service account key in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} --- @@ -417,7 +417,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -430,7 +430,7 @@ If you experience problems setting this value it might not be settable. Please t The maximum space, in bytes, to use for snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} --- @@ -440,7 +440,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} --- @@ -450,7 +450,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How many snapshots are to be kept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} --- @@ -1052,7 +1052,7 @@ The construct id used in the generated config for the RaftSnapshotAgentConfig to The id of the existing RaftSnapshotAgentConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use --- @@ -1977,7 +1977,7 @@ RaftSnapshotAgentConfigConfig.builder() | googleEndpoint | java.lang.String | GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. | | googleGcsBucket | java.lang.String | GCS bucket to write snapshots to. | | googleServiceAccountKey | java.lang.String | Google service account key in JSON format. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | | localMaxSpace | java.lang.Number | The maximum space, in bytes, to use for snapshots. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | retain | java.lang.Number | How many snapshots are to be kept. | @@ -2064,7 +2064,7 @@ public java.lang.Number getIntervalSeconds(); Number of seconds between snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} --- @@ -2078,7 +2078,7 @@ public java.lang.String getName(); Name of the snapshot agent configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} --- @@ -2092,7 +2092,7 @@ public java.lang.String getPathPrefix(); The directory or bucket prefix to to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} --- @@ -2106,7 +2106,7 @@ public java.lang.String getStorageType(); What storage service to send snapshots to. One of "local", "azure-blob", "aws-s3", or "google-gcs". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} --- @@ -2120,7 +2120,7 @@ public java.lang.String getAwsAccessKeyId(); AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} --- @@ -2134,7 +2134,7 @@ public java.lang.String getAwsS3Bucket(); S3 bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} --- @@ -2148,7 +2148,7 @@ public java.lang.Object getAwsS3DisableTls(); Disable TLS for the S3 endpoint. This should only be used for testing purposes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} --- @@ -2162,7 +2162,7 @@ public java.lang.Object getAwsS3EnableKms(); Use KMS to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} --- @@ -2176,7 +2176,7 @@ public java.lang.String getAwsS3Endpoint(); AWS endpoint. This is typically only set when using a non-AWS S3 implementation like Minio. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} --- @@ -2190,7 +2190,7 @@ public java.lang.Object getAwsS3ForcePathStyle(); Use the endpoint/bucket URL style instead of bucket.endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} --- @@ -2204,7 +2204,7 @@ public java.lang.String getAwsS3KmsKey(); Use named KMS key, when aws_s3_enable_kms=true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} --- @@ -2218,7 +2218,7 @@ public java.lang.String getAwsS3Region(); AWS region bucket is in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} --- @@ -2232,7 +2232,7 @@ public java.lang.Object getAwsS3ServerSideEncryption(); Use AES256 to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} --- @@ -2246,7 +2246,7 @@ public java.lang.String getAwsSecretAccessKey(); AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} --- @@ -2260,7 +2260,7 @@ public java.lang.String getAwsSessionToken(); AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} --- @@ -2274,7 +2274,7 @@ public java.lang.String getAzureAccountKey(); Azure account key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} --- @@ -2288,7 +2288,7 @@ public java.lang.String getAzureAccountName(); Azure account name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} --- @@ -2302,7 +2302,7 @@ public java.lang.String getAzureBlobEnvironment(); Azure blob environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} --- @@ -2316,7 +2316,7 @@ public java.lang.String getAzureContainerName(); Azure container name to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} --- @@ -2330,7 +2330,7 @@ public java.lang.String getAzureEndpoint(); Azure blob storage endpoint. This is typically only set when using a non-Azure implementation like Azurite. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} --- @@ -2344,7 +2344,7 @@ public java.lang.String getFilePrefix(); The file or object name of snapshot files will start with this string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} --- @@ -2358,7 +2358,7 @@ public java.lang.Object getGoogleDisableTls(); Disable TLS for the GCS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} --- @@ -2372,7 +2372,7 @@ public java.lang.String getGoogleEndpoint(); GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} --- @@ -2386,7 +2386,7 @@ public java.lang.String getGoogleGcsBucket(); GCS bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} --- @@ -2400,7 +2400,7 @@ public java.lang.String getGoogleServiceAccountKey(); Google service account key in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} --- @@ -2412,7 +2412,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2429,7 +2429,7 @@ public java.lang.Number getLocalMaxSpace(); The maximum space, in bytes, to use for snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} --- @@ -2443,7 +2443,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} --- @@ -2457,7 +2457,7 @@ public java.lang.Number getRetain(); How many snapshots are to be kept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} --- diff --git a/docs/raftSnapshotAgentConfig.python.md b/docs/raftSnapshotAgentConfig.python.md index e5b48ef4..577cac9b 100644 --- a/docs/raftSnapshotAgentConfig.python.md +++ b/docs/raftSnapshotAgentConfig.python.md @@ -4,7 +4,7 @@ ### RaftSnapshotAgentConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. #### Initializers @@ -89,7 +89,7 @@ raftSnapshotAgentConfig.RaftSnapshotAgentConfig( | google_endpoint | str | GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. | | google_gcs_bucket | str | GCS bucket to write snapshots to. | | google_service_account_key | str | Google service account key in JSON format. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | | local_max_space | typing.Union[int, float] | The maximum space, in bytes, to use for snapshots. | | namespace | str | Target namespace. (requires Enterprise). | | retain | typing.Union[int, float] | How many snapshots are to be kept. | @@ -162,7 +162,7 @@ Must be unique amongst siblings in the same scope Number of seconds between snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the snapshot agent configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The directory or bucket prefix to to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi What storage service to send snapshots to. One of "local", "azure-blob", "aws-s3", or "google-gcs". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi S3 bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable TLS for the S3 endpoint. This should only be used for testing purposes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} --- @@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use KMS to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS endpoint. This is typically only set when using a non-AWS S3 implementation like Minio. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use the endpoint/bucket URL style instead of bucket.endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use named KMS key, when aws_s3_enable_kms=true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS region bucket is in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use AES256 to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} --- @@ -302,7 +302,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} --- @@ -312,7 +312,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure account key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} --- @@ -322,7 +322,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure account name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} --- @@ -332,7 +332,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure blob environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} --- @@ -342,7 +342,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure container name to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} --- @@ -352,7 +352,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure blob storage endpoint. This is typically only set when using a non-Azure implementation like Azurite. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} --- @@ -362,7 +362,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The file or object name of snapshot files will start with this string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} --- @@ -372,7 +372,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable TLS for the GCS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} --- @@ -382,7 +382,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} --- @@ -392,7 +392,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi GCS bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} --- @@ -402,7 +402,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Google service account key in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} --- @@ -410,7 +410,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -423,7 +423,7 @@ If you experience problems setting this value it might not be settable. Please t The maximum space, in bytes, to use for snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} --- @@ -433,7 +433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} --- @@ -443,7 +443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How many snapshots are to be kept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} --- @@ -1091,7 +1091,7 @@ The construct id used in the generated config for the RaftSnapshotAgentConfig to The id of the existing RaftSnapshotAgentConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use --- @@ -2007,7 +2007,7 @@ raftSnapshotAgentConfig.RaftSnapshotAgentConfigConfig( | google_endpoint | str | GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. | | google_gcs_bucket | str | GCS bucket to write snapshots to. | | google_service_account_key | str | Google service account key in JSON format. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | | local_max_space | typing.Union[int, float] | The maximum space, in bytes, to use for snapshots. | | namespace | str | Target namespace. (requires Enterprise). | | retain | typing.Union[int, float] | How many snapshots are to be kept. | @@ -2094,7 +2094,7 @@ interval_seconds: typing.Union[int, float] Number of seconds between snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} --- @@ -2108,7 +2108,7 @@ name: str Name of the snapshot agent configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} --- @@ -2122,7 +2122,7 @@ path_prefix: str The directory or bucket prefix to to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} --- @@ -2136,7 +2136,7 @@ storage_type: str What storage service to send snapshots to. One of "local", "azure-blob", "aws-s3", or "google-gcs". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} --- @@ -2150,7 +2150,7 @@ aws_access_key_id: str AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} --- @@ -2164,7 +2164,7 @@ aws_s3_bucket: str S3 bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} --- @@ -2178,7 +2178,7 @@ aws_s3_disable_tls: typing.Union[bool, IResolvable] Disable TLS for the S3 endpoint. This should only be used for testing purposes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} --- @@ -2192,7 +2192,7 @@ aws_s3_enable_kms: typing.Union[bool, IResolvable] Use KMS to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} --- @@ -2206,7 +2206,7 @@ aws_s3_endpoint: str AWS endpoint. This is typically only set when using a non-AWS S3 implementation like Minio. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} --- @@ -2220,7 +2220,7 @@ aws_s3_force_path_style: typing.Union[bool, IResolvable] Use the endpoint/bucket URL style instead of bucket.endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} --- @@ -2234,7 +2234,7 @@ aws_s3_kms_key: str Use named KMS key, when aws_s3_enable_kms=true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} --- @@ -2248,7 +2248,7 @@ aws_s3_region: str AWS region bucket is in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} --- @@ -2262,7 +2262,7 @@ aws_s3_server_side_encryption: typing.Union[bool, IResolvable] Use AES256 to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} --- @@ -2276,7 +2276,7 @@ aws_secret_access_key: str AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} --- @@ -2290,7 +2290,7 @@ aws_session_token: str AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} --- @@ -2304,7 +2304,7 @@ azure_account_key: str Azure account key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} --- @@ -2318,7 +2318,7 @@ azure_account_name: str Azure account name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} --- @@ -2332,7 +2332,7 @@ azure_blob_environment: str Azure blob environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} --- @@ -2346,7 +2346,7 @@ azure_container_name: str Azure container name to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} --- @@ -2360,7 +2360,7 @@ azure_endpoint: str Azure blob storage endpoint. This is typically only set when using a non-Azure implementation like Azurite. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} --- @@ -2374,7 +2374,7 @@ file_prefix: str The file or object name of snapshot files will start with this string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} --- @@ -2388,7 +2388,7 @@ google_disable_tls: typing.Union[bool, IResolvable] Disable TLS for the GCS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} --- @@ -2402,7 +2402,7 @@ google_endpoint: str GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} --- @@ -2416,7 +2416,7 @@ google_gcs_bucket: str GCS bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} --- @@ -2430,7 +2430,7 @@ google_service_account_key: str Google service account key in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} --- @@ -2442,7 +2442,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2459,7 +2459,7 @@ local_max_space: typing.Union[int, float] The maximum space, in bytes, to use for snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} --- @@ -2473,7 +2473,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} --- @@ -2487,7 +2487,7 @@ retain: typing.Union[int, float] How many snapshots are to be kept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} --- diff --git a/docs/raftSnapshotAgentConfig.typescript.md b/docs/raftSnapshotAgentConfig.typescript.md index d99c8582..02fafe44 100644 --- a/docs/raftSnapshotAgentConfig.typescript.md +++ b/docs/raftSnapshotAgentConfig.typescript.md @@ -4,7 +4,7 @@ ### RaftSnapshotAgentConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config}. #### Initializers @@ -642,7 +642,7 @@ The construct id used in the generated config for the RaftSnapshotAgentConfig to The id of the existing RaftSnapshotAgentConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use --- @@ -1521,7 +1521,7 @@ const raftSnapshotAgentConfigConfig: raftSnapshotAgentConfig.RaftSnapshotAgentCo | googleEndpoint | string | GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. | | googleGcsBucket | string | GCS bucket to write snapshots to. | | googleServiceAccountKey | string | Google service account key in JSON format. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. | | localMaxSpace | number | The maximum space, in bytes, to use for snapshots. | | namespace | string | Target namespace. (requires Enterprise). | | retain | number | How many snapshots are to be kept. | @@ -1608,7 +1608,7 @@ public readonly intervalSeconds: number; Number of seconds between snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} --- @@ -1622,7 +1622,7 @@ public readonly name: string; Name of the snapshot agent configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} --- @@ -1636,7 +1636,7 @@ public readonly pathPrefix: string; The directory or bucket prefix to to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} --- @@ -1650,7 +1650,7 @@ public readonly storageType: string; What storage service to send snapshots to. One of "local", "azure-blob", "aws-s3", or "google-gcs". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} --- @@ -1664,7 +1664,7 @@ public readonly awsAccessKeyId: string; AWS access key ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} --- @@ -1678,7 +1678,7 @@ public readonly awsS3Bucket: string; S3 bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} --- @@ -1692,7 +1692,7 @@ public readonly awsS3DisableTls: boolean | IResolvable; Disable TLS for the S3 endpoint. This should only be used for testing purposes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} --- @@ -1706,7 +1706,7 @@ public readonly awsS3EnableKms: boolean | IResolvable; Use KMS to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} --- @@ -1720,7 +1720,7 @@ public readonly awsS3Endpoint: string; AWS endpoint. This is typically only set when using a non-AWS S3 implementation like Minio. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} --- @@ -1734,7 +1734,7 @@ public readonly awsS3ForcePathStyle: boolean | IResolvable; Use the endpoint/bucket URL style instead of bucket.endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} --- @@ -1748,7 +1748,7 @@ public readonly awsS3KmsKey: string; Use named KMS key, when aws_s3_enable_kms=true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} --- @@ -1762,7 +1762,7 @@ public readonly awsS3Region: string; AWS region bucket is in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} --- @@ -1776,7 +1776,7 @@ public readonly awsS3ServerSideEncryption: boolean | IResolvable; Use AES256 to encrypt bucket contents. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} --- @@ -1790,7 +1790,7 @@ public readonly awsSecretAccessKey: string; AWS secret access key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} --- @@ -1804,7 +1804,7 @@ public readonly awsSessionToken: string; AWS session token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} --- @@ -1818,7 +1818,7 @@ public readonly azureAccountKey: string; Azure account key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} --- @@ -1832,7 +1832,7 @@ public readonly azureAccountName: string; Azure account name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} --- @@ -1846,7 +1846,7 @@ public readonly azureBlobEnvironment: string; Azure blob environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} --- @@ -1860,7 +1860,7 @@ public readonly azureContainerName: string; Azure container name to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} --- @@ -1874,7 +1874,7 @@ public readonly azureEndpoint: string; Azure blob storage endpoint. This is typically only set when using a non-Azure implementation like Azurite. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} --- @@ -1888,7 +1888,7 @@ public readonly filePrefix: string; The file or object name of snapshot files will start with this string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} --- @@ -1902,7 +1902,7 @@ public readonly googleDisableTls: boolean | IResolvable; Disable TLS for the GCS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} --- @@ -1916,7 +1916,7 @@ public readonly googleEndpoint: string; GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} --- @@ -1930,7 +1930,7 @@ public readonly googleGcsBucket: string; GCS bucket to write snapshots to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} --- @@ -1944,7 +1944,7 @@ public readonly googleServiceAccountKey: string; Google service account key in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} --- @@ -1956,7 +1956,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1973,7 +1973,7 @@ public readonly localMaxSpace: number; The maximum space, in bytes, to use for snapshots. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} --- @@ -1987,7 +1987,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} --- @@ -2001,7 +2001,7 @@ public readonly retain: number; How many snapshots are to be kept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} --- diff --git a/docs/rgpPolicy.csharp.md b/docs/rgpPolicy.csharp.md index 1366af82..080fc2b8 100644 --- a/docs/rgpPolicy.csharp.md +++ b/docs/rgpPolicy.csharp.md @@ -4,7 +4,7 @@ ### RgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy vault_rgp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy vault_rgp_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the RgpPolicy to import. The id of the existing RgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ new RgpPolicyConfig { | EnforcementLevel | string | Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. | | Name | string | Name of the policy. | | Policy | string | The policy document. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -908,7 +908,7 @@ public string EnforcementLevel { get; set; } Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} --- @@ -922,7 +922,7 @@ public string Name { get; set; } Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#name RgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#name RgpPolicy#name} --- @@ -936,7 +936,7 @@ public string Policy { get; set; } The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#policy RgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#policy RgpPolicy#policy} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} --- diff --git a/docs/rgpPolicy.go.md b/docs/rgpPolicy.go.md index f69efa7b..745f6efc 100644 --- a/docs/rgpPolicy.go.md +++ b/docs/rgpPolicy.go.md @@ -4,12 +4,12 @@ ### RgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy vault_rgp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy vault_rgp_policy}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rgppolicy" rgppolicy.NewRgpPolicy(scope Construct, id *string, config RgpPolicyConfig) RgpPolicy ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rgppolicy" rgppolicy.RgpPolicy_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rgppolicy" rgppolicy.RgpPolicy_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ rgppolicy.RgpPolicy_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rgppolicy" rgppolicy.RgpPolicy_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ rgppolicy.RgpPolicy_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rgppolicy" rgppolicy.RgpPolicy_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the RgpPolicy to import. The id of the existing RgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use --- @@ -791,7 +791,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/rgppolicy" &rgppolicy.RgpPolicyConfig { Connection: interface{}, @@ -823,7 +823,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/rgppolicy" | EnforcementLevel | *string | Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. | | Name | *string | Name of the policy. | | Policy | *string | The policy document. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -908,7 +908,7 @@ EnforcementLevel *string Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} --- @@ -922,7 +922,7 @@ Name *string Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#name RgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#name RgpPolicy#name} --- @@ -936,7 +936,7 @@ Policy *string The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#policy RgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#policy RgpPolicy#policy} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} --- diff --git a/docs/rgpPolicy.java.md b/docs/rgpPolicy.java.md index a9f2f8c0..8c6b0e86 100644 --- a/docs/rgpPolicy.java.md +++ b/docs/rgpPolicy.java.md @@ -4,7 +4,7 @@ ### RgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy vault_rgp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy vault_rgp_policy}. #### Initializers @@ -45,7 +45,7 @@ RgpPolicy.Builder.create(Construct scope, java.lang.String id) | enforcementLevel | java.lang.String | Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. | | name | java.lang.String | Name of the policy. | | policy | java.lang.String | The policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#name RgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#name RgpPolicy#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#policy RgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#policy RgpPolicy#policy} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} --- @@ -598,7 +598,7 @@ The construct id used in the generated config for the RgpPolicy to import. The id of the existing RgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use --- @@ -944,7 +944,7 @@ RgpPolicyConfig.builder() | enforcementLevel | java.lang.String | Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. | | name | java.lang.String | Name of the policy. | | policy | java.lang.String | The policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1029,7 +1029,7 @@ public java.lang.String getEnforcementLevel(); Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} --- @@ -1043,7 +1043,7 @@ public java.lang.String getName(); Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#name RgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#name RgpPolicy#name} --- @@ -1057,7 +1057,7 @@ public java.lang.String getPolicy(); The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#policy RgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#policy RgpPolicy#policy} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} --- diff --git a/docs/rgpPolicy.python.md b/docs/rgpPolicy.python.md index f367d72c..19781546 100644 --- a/docs/rgpPolicy.python.md +++ b/docs/rgpPolicy.python.md @@ -4,7 +4,7 @@ ### RgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy vault_rgp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy vault_rgp_policy}. #### Initializers @@ -43,7 +43,7 @@ rgpPolicy.RgpPolicy( | enforcement_level | str | Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. | | name | str | Name of the policy. | | policy | str | The policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#name RgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#name RgpPolicy#name} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#policy RgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#policy RgpPolicy#policy} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} --- @@ -642,7 +642,7 @@ The construct id used in the generated config for the RgpPolicy to import. The id of the existing RgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use --- @@ -984,7 +984,7 @@ rgpPolicy.RgpPolicyConfig( | enforcement_level | str | Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. | | name | str | Name of the policy. | | policy | str | The policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1069,7 +1069,7 @@ enforcement_level: str Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} --- @@ -1083,7 +1083,7 @@ name: str Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#name RgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#name RgpPolicy#name} --- @@ -1097,7 +1097,7 @@ policy: str The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#policy RgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#policy RgpPolicy#policy} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} --- diff --git a/docs/rgpPolicy.typescript.md b/docs/rgpPolicy.typescript.md index 3b688c43..7d6889c4 100644 --- a/docs/rgpPolicy.typescript.md +++ b/docs/rgpPolicy.typescript.md @@ -4,7 +4,7 @@ ### RgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy vault_rgp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy vault_rgp_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the RgpPolicy to import. The id of the existing RgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use --- @@ -810,7 +810,7 @@ const rgpPolicyConfig: rgpPolicy.RgpPolicyConfig = { ... } | enforcementLevel | string | Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. | | name | string | Name of the policy. | | policy | string | The policy document. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -895,7 +895,7 @@ public readonly enforcementLevel: string; Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} --- @@ -909,7 +909,7 @@ public readonly name: string; Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#name RgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#name RgpPolicy#name} --- @@ -923,7 +923,7 @@ public readonly policy: string; The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#policy RgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#policy RgpPolicy#policy} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} --- diff --git a/docs/samlAuthBackend.csharp.md b/docs/samlAuthBackend.csharp.md index bb9c2969..ad8b0e20 100644 --- a/docs/samlAuthBackend.csharp.md +++ b/docs/samlAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### SamlAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. #### Initializers @@ -537,7 +537,7 @@ The construct id used in the generated config for the SamlAuthBackend to import. The id of the existing SamlAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1041,7 +1041,7 @@ new SamlAuthBackendConfig { | EntityId | string | The entity ID of the SAML authentication service provider. | | DefaultRole | string | The role to use if no role is provided during login. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | | IdpCert | string | The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | IdpEntityId | string | The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | IdpMetadataUrl | string | The metadata URL of the identity provider. | @@ -1132,7 +1132,7 @@ public string[] AcsUrls { get; set; } The well-formatted URLs of your Assertion Consumer Service (ACS) that should receive a response from the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} --- @@ -1146,7 +1146,7 @@ public string EntityId { get; set; } The entity ID of the SAML authentication service provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} --- @@ -1160,7 +1160,7 @@ public string DefaultRole { get; set; } The role to use if no role is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} --- @@ -1174,7 +1174,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} --- @@ -1186,7 +1186,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1203,7 +1203,7 @@ public string IdpCert { get; set; } The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} --- @@ -1217,7 +1217,7 @@ public string IdpEntityId { get; set; } The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} --- @@ -1231,7 +1231,7 @@ public string IdpMetadataUrl { get; set; } The metadata URL of the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} --- @@ -1245,7 +1245,7 @@ public string IdpSsoUrl { get; set; } The SSO URL of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} --- @@ -1259,7 +1259,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} --- @@ -1273,7 +1273,7 @@ public string Path { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} --- @@ -1287,7 +1287,7 @@ public object VerboseLogging { get; set; } Log additional, potentially sensitive information during the SAML exchange according to the current logging level. Not recommended for production. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} --- diff --git a/docs/samlAuthBackend.go.md b/docs/samlAuthBackend.go.md index 5835cc27..b6e20a42 100644 --- a/docs/samlAuthBackend.go.md +++ b/docs/samlAuthBackend.go.md @@ -4,12 +4,12 @@ ### SamlAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackend" samlauthbackend.NewSamlAuthBackend(scope Construct, id *string, config SamlAuthBackendConfig) SamlAuthBackend ``` @@ -448,7 +448,7 @@ func ResetVerboseLogging() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackend" samlauthbackend.SamlAuthBackend_IsConstruct(x interface{}) *bool ``` @@ -480,7 +480,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackend" samlauthbackend.SamlAuthBackend_IsTerraformElement(x interface{}) *bool ``` @@ -494,7 +494,7 @@ samlauthbackend.SamlAuthBackend_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackend" samlauthbackend.SamlAuthBackend_IsTerraformResource(x interface{}) *bool ``` @@ -508,7 +508,7 @@ samlauthbackend.SamlAuthBackend_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackend" samlauthbackend.SamlAuthBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -537,7 +537,7 @@ The construct id used in the generated config for the SamlAuthBackend to import. The id of the existing SamlAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1001,7 +1001,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackend" &samlauthbackend.SamlAuthBackendConfig { Connection: interface{}, @@ -1041,7 +1041,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackend" | EntityId | *string | The entity ID of the SAML authentication service provider. | | DefaultRole | *string | The role to use if no role is provided during login. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | | IdpCert | *string | The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | IdpEntityId | *string | The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | IdpMetadataUrl | *string | The metadata URL of the identity provider. | @@ -1132,7 +1132,7 @@ AcsUrls *[]*string The well-formatted URLs of your Assertion Consumer Service (ACS) that should receive a response from the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} --- @@ -1146,7 +1146,7 @@ EntityId *string The entity ID of the SAML authentication service provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} --- @@ -1160,7 +1160,7 @@ DefaultRole *string The role to use if no role is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} --- @@ -1174,7 +1174,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} --- @@ -1186,7 +1186,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1203,7 +1203,7 @@ IdpCert *string The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} --- @@ -1217,7 +1217,7 @@ IdpEntityId *string The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} --- @@ -1231,7 +1231,7 @@ IdpMetadataUrl *string The metadata URL of the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} --- @@ -1245,7 +1245,7 @@ IdpSsoUrl *string The SSO URL of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} --- @@ -1259,7 +1259,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} --- @@ -1273,7 +1273,7 @@ Path *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} --- @@ -1287,7 +1287,7 @@ VerboseLogging interface{} Log additional, potentially sensitive information during the SAML exchange according to the current logging level. Not recommended for production. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} --- diff --git a/docs/samlAuthBackend.java.md b/docs/samlAuthBackend.java.md index c6283c6c..8ffb679b 100644 --- a/docs/samlAuthBackend.java.md +++ b/docs/samlAuthBackend.java.md @@ -4,7 +4,7 @@ ### SamlAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. #### Initializers @@ -55,7 +55,7 @@ SamlAuthBackend.Builder.create(Construct scope, java.lang.String id) | entityId | java.lang.String | The entity ID of the SAML authentication service provider. | | defaultRole | java.lang.String | The role to use if no role is provided during login. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | | idpCert | java.lang.String | The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idpEntityId | java.lang.String | The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idpMetadataUrl | java.lang.String | The metadata URL of the identity provider. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The well-formatted URLs of your Assertion Consumer Service (ACS) that should receive a response from the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The entity ID of the SAML authentication service provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The role to use if no role is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -183,7 +183,7 @@ If you experience problems setting this value it might not be settable. Please t The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata URL of the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SSO URL of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Log additional, potentially sensitive information during the SAML exchange according to the current logging level. Not recommended for production. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} --- @@ -740,7 +740,7 @@ The construct id used in the generated config for the SamlAuthBackend to import. The id of the existing SamlAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1250,7 +1250,7 @@ SamlAuthBackendConfig.builder() | entityId | java.lang.String | The entity ID of the SAML authentication service provider. | | defaultRole | java.lang.String | The role to use if no role is provided during login. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | | idpCert | java.lang.String | The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idpEntityId | java.lang.String | The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idpMetadataUrl | java.lang.String | The metadata URL of the identity provider. | @@ -1341,7 +1341,7 @@ public java.util.List getAcsUrls(); The well-formatted URLs of your Assertion Consumer Service (ACS) that should receive a response from the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} --- @@ -1355,7 +1355,7 @@ public java.lang.String getEntityId(); The entity ID of the SAML authentication service provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} --- @@ -1369,7 +1369,7 @@ public java.lang.String getDefaultRole(); The role to use if no role is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} --- @@ -1383,7 +1383,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} --- @@ -1395,7 +1395,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1412,7 +1412,7 @@ public java.lang.String getIdpCert(); The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} --- @@ -1426,7 +1426,7 @@ public java.lang.String getIdpEntityId(); The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} --- @@ -1440,7 +1440,7 @@ public java.lang.String getIdpMetadataUrl(); The metadata URL of the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} --- @@ -1454,7 +1454,7 @@ public java.lang.String getIdpSsoUrl(); The SSO URL of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} --- @@ -1468,7 +1468,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} --- @@ -1482,7 +1482,7 @@ public java.lang.String getPath(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} --- @@ -1496,7 +1496,7 @@ public java.lang.Object getVerboseLogging(); Log additional, potentially sensitive information during the SAML exchange according to the current logging level. Not recommended for production. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} --- diff --git a/docs/samlAuthBackend.python.md b/docs/samlAuthBackend.python.md index f21107f8..61fcd3b2 100644 --- a/docs/samlAuthBackend.python.md +++ b/docs/samlAuthBackend.python.md @@ -4,7 +4,7 @@ ### SamlAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. #### Initializers @@ -51,7 +51,7 @@ samlAuthBackend.SamlAuthBackend( | entity_id | str | The entity ID of the SAML authentication service provider. | | default_role | str | The role to use if no role is provided during login. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | | idp_cert | str | The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idp_entity_id | str | The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idp_metadata_url | str | The metadata URL of the identity provider. | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope The well-formatted URLs of your Assertion Consumer Service (ACS) that should receive a response from the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The entity ID of the SAML authentication service provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The role to use if no role is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata URL of the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SSO URL of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Log additional, potentially sensitive information during the SAML exchange according to the current logging level. Not recommended for production. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} --- @@ -782,7 +782,7 @@ The construct id used in the generated config for the SamlAuthBackend to import. The id of the existing SamlAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1286,7 +1286,7 @@ samlAuthBackend.SamlAuthBackendConfig( | entity_id | str | The entity ID of the SAML authentication service provider. | | default_role | str | The role to use if no role is provided during login. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | | idp_cert | str | The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idp_entity_id | str | The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idp_metadata_url | str | The metadata URL of the identity provider. | @@ -1377,7 +1377,7 @@ acs_urls: typing.List[str] The well-formatted URLs of your Assertion Consumer Service (ACS) that should receive a response from the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} --- @@ -1391,7 +1391,7 @@ entity_id: str The entity ID of the SAML authentication service provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} --- @@ -1405,7 +1405,7 @@ default_role: str The role to use if no role is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} --- @@ -1419,7 +1419,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} --- @@ -1431,7 +1431,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1448,7 +1448,7 @@ idp_cert: str The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} --- @@ -1462,7 +1462,7 @@ idp_entity_id: str The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} --- @@ -1476,7 +1476,7 @@ idp_metadata_url: str The metadata URL of the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} --- @@ -1490,7 +1490,7 @@ idp_sso_url: str The SSO URL of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} --- @@ -1504,7 +1504,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} --- @@ -1518,7 +1518,7 @@ path: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} --- @@ -1532,7 +1532,7 @@ verbose_logging: typing.Union[bool, IResolvable] Log additional, potentially sensitive information during the SAML exchange according to the current logging level. Not recommended for production. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} --- diff --git a/docs/samlAuthBackend.typescript.md b/docs/samlAuthBackend.typescript.md index ae0c0f0b..be87b104 100644 --- a/docs/samlAuthBackend.typescript.md +++ b/docs/samlAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### SamlAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend vault_saml_auth_backend}. #### Initializers @@ -537,7 +537,7 @@ The construct id used in the generated config for the SamlAuthBackend to import. The id of the existing SamlAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1021,7 +1021,7 @@ const samlAuthBackendConfig: samlAuthBackend.SamlAuthBackendConfig = { ... } | entityId | string | The entity ID of the SAML authentication service provider. | | defaultRole | string | The role to use if no role is provided during login. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. | | idpCert | string | The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idpEntityId | string | The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. | | idpMetadataUrl | string | The metadata URL of the identity provider. | @@ -1112,7 +1112,7 @@ public readonly acsUrls: string[]; The well-formatted URLs of your Assertion Consumer Service (ACS) that should receive a response from the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} --- @@ -1126,7 +1126,7 @@ public readonly entityId: string; The entity ID of the SAML authentication service provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} --- @@ -1140,7 +1140,7 @@ public readonly defaultRole: string; The role to use if no role is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} --- @@ -1154,7 +1154,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} --- @@ -1166,7 +1166,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ public readonly idpCert: string; The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} --- @@ -1197,7 +1197,7 @@ public readonly idpEntityId: string; The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} --- @@ -1211,7 +1211,7 @@ public readonly idpMetadataUrl: string; The metadata URL of the identity provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} --- @@ -1225,7 +1225,7 @@ public readonly idpSsoUrl: string; The SSO URL of the identity provider. Mutually exclusive with 'idp_metadata_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} --- @@ -1239,7 +1239,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} --- @@ -1253,7 +1253,7 @@ public readonly path: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} --- @@ -1267,7 +1267,7 @@ public readonly verboseLogging: boolean | IResolvable; Log additional, potentially sensitive information during the SAML exchange according to the current logging level. Not recommended for production. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} --- diff --git a/docs/samlAuthBackendRole.csharp.md b/docs/samlAuthBackendRole.csharp.md index 615fbd0e..3315febc 100644 --- a/docs/samlAuthBackendRole.csharp.md +++ b/docs/samlAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### SamlAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the SamlAuthBackendRole to imp The id of the existing SamlAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1224,7 +1224,7 @@ new SamlAuthBackendRoleConfig { | BoundSubjects | string[] | The subject being asserted for SAML authentication. | | BoundSubjectsType | string | The type of matching assertion to perform on bound_subjects. | | GroupsAttribute | string | The attribute to use to identify the set of groups to which the user belongs. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1318,7 +1318,7 @@ public string Name { get; set; } Unique name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} --- @@ -1332,7 +1332,7 @@ public string Path { get; set; } Path where SAML Auth engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} --- @@ -1346,7 +1346,7 @@ public System.Collections.Generic.IDictionary BoundAttributes { Mapping of attribute names to values that are expected to exist in the SAML assertion. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} --- @@ -1360,7 +1360,7 @@ public string BoundAttributesType { get; set; } The type of matching assertion to perform on bound_attributes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} --- @@ -1374,7 +1374,7 @@ public string[] BoundSubjects { get; set; } The subject being asserted for SAML authentication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} --- @@ -1388,7 +1388,7 @@ public string BoundSubjectsType { get; set; } The type of matching assertion to perform on bound_subjects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} --- @@ -1402,7 +1402,7 @@ public string GroupsAttribute { get; set; } The attribute to use to identify the set of groups to which the user belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} --- @@ -1414,7 +1414,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1431,7 +1431,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} --- @@ -1445,7 +1445,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} --- @@ -1459,7 +1459,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} --- @@ -1473,7 +1473,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} --- @@ -1487,7 +1487,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} --- @@ -1501,7 +1501,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} --- @@ -1515,7 +1515,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} --- @@ -1529,7 +1529,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} --- @@ -1543,7 +1543,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} --- @@ -1557,7 +1557,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} --- diff --git a/docs/samlAuthBackendRole.go.md b/docs/samlAuthBackendRole.go.md index 4c1c0ad5..322d3413 100644 --- a/docs/samlAuthBackendRole.go.md +++ b/docs/samlAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### SamlAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackendrole" samlauthbackendrole.NewSamlAuthBackendRole(scope Construct, id *string, config SamlAuthBackendRoleConfig) SamlAuthBackendRole ``` @@ -490,7 +490,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackendrole" samlauthbackendrole.SamlAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -522,7 +522,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackendrole" samlauthbackendrole.SamlAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -536,7 +536,7 @@ samlauthbackendrole.SamlAuthBackendRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackendrole" samlauthbackendrole.SamlAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -550,7 +550,7 @@ samlauthbackendrole.SamlAuthBackendRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackendrole" samlauthbackendrole.SamlAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -579,7 +579,7 @@ The construct id used in the generated config for the SamlAuthBackendRole to imp The id of the existing SamlAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1175,7 +1175,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/samlauthbackendrole" &samlauthbackendrole.SamlAuthBackendRoleConfig { Connection: interface{}, @@ -1224,7 +1224,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/samlauthbackendrole" | BoundSubjects | *[]*string | The subject being asserted for SAML authentication. | | BoundSubjectsType | *string | The type of matching assertion to perform on bound_subjects. | | GroupsAttribute | *string | The attribute to use to identify the set of groups to which the user belongs. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1318,7 +1318,7 @@ Name *string Unique name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} --- @@ -1332,7 +1332,7 @@ Path *string Path where SAML Auth engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} --- @@ -1346,7 +1346,7 @@ BoundAttributes *map[string]*string Mapping of attribute names to values that are expected to exist in the SAML assertion. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} --- @@ -1360,7 +1360,7 @@ BoundAttributesType *string The type of matching assertion to perform on bound_attributes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} --- @@ -1374,7 +1374,7 @@ BoundSubjects *[]*string The subject being asserted for SAML authentication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} --- @@ -1388,7 +1388,7 @@ BoundSubjectsType *string The type of matching assertion to perform on bound_subjects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} --- @@ -1402,7 +1402,7 @@ GroupsAttribute *string The attribute to use to identify the set of groups to which the user belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} --- @@ -1414,7 +1414,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1431,7 +1431,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} --- @@ -1445,7 +1445,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} --- @@ -1459,7 +1459,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} --- @@ -1473,7 +1473,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} --- @@ -1487,7 +1487,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} --- @@ -1501,7 +1501,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} --- @@ -1515,7 +1515,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} --- @@ -1529,7 +1529,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} --- @@ -1543,7 +1543,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} --- @@ -1557,7 +1557,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} --- diff --git a/docs/samlAuthBackendRole.java.md b/docs/samlAuthBackendRole.java.md index 05150fef..180e9d6e 100644 --- a/docs/samlAuthBackendRole.java.md +++ b/docs/samlAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### SamlAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. #### Initializers @@ -63,7 +63,7 @@ SamlAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | boundSubjects | java.util.List | The subject being asserted for SAML authentication. | | boundSubjectsType | java.lang.String | The type of matching assertion to perform on bound_subjects. | | groupsAttribute | java.lang.String | The attribute to use to identify the set of groups to which the user belongs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -143,7 +143,7 @@ Must be unique amongst siblings in the same scope Unique name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where SAML Auth engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mapping of attribute names to values that are expected to exist in the SAML assertion. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of matching assertion to perform on bound_attributes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The subject being asserted for SAML authentication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of matching assertion to perform on bound_subjects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The attribute to use to identify the set of groups to which the user belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -224,7 +224,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} --- @@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} --- @@ -244,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} --- @@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} --- @@ -264,7 +264,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} --- @@ -274,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} --- @@ -284,7 +284,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} --- @@ -294,7 +294,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} --- @@ -304,7 +304,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} --- @@ -314,7 +314,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} --- @@ -853,7 +853,7 @@ The construct id used in the generated config for the SamlAuthBackendRole to imp The id of the existing SamlAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1503,7 +1503,7 @@ SamlAuthBackendRoleConfig.builder() | boundSubjects | java.util.List | The subject being asserted for SAML authentication. | | boundSubjectsType | java.lang.String | The type of matching assertion to perform on bound_subjects. | | groupsAttribute | java.lang.String | The attribute to use to identify the set of groups to which the user belongs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1597,7 +1597,7 @@ public java.lang.String getName(); Unique name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} --- @@ -1611,7 +1611,7 @@ public java.lang.String getPath(); Path where SAML Auth engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} --- @@ -1625,7 +1625,7 @@ public java.util.Map getBoundAttributes(); Mapping of attribute names to values that are expected to exist in the SAML assertion. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} --- @@ -1639,7 +1639,7 @@ public java.lang.String getBoundAttributesType(); The type of matching assertion to perform on bound_attributes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} --- @@ -1653,7 +1653,7 @@ public java.util.List getBoundSubjects(); The subject being asserted for SAML authentication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} --- @@ -1667,7 +1667,7 @@ public java.lang.String getBoundSubjectsType(); The type of matching assertion to perform on bound_subjects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} --- @@ -1681,7 +1681,7 @@ public java.lang.String getGroupsAttribute(); The attribute to use to identify the set of groups to which the user belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} --- @@ -1693,7 +1693,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1710,7 +1710,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} --- @@ -1724,7 +1724,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} --- @@ -1738,7 +1738,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} --- @@ -1752,7 +1752,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} --- @@ -1766,7 +1766,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} --- @@ -1780,7 +1780,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} --- @@ -1794,7 +1794,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} --- @@ -1808,7 +1808,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} --- @@ -1822,7 +1822,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} --- @@ -1836,7 +1836,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} --- diff --git a/docs/samlAuthBackendRole.python.md b/docs/samlAuthBackendRole.python.md index fea92e3f..3174a108 100644 --- a/docs/samlAuthBackendRole.python.md +++ b/docs/samlAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### SamlAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. #### Initializers @@ -60,7 +60,7 @@ samlAuthBackendRole.SamlAuthBackendRole( | bound_subjects | typing.List[str] | The subject being asserted for SAML authentication. | | bound_subjects_type | str | The type of matching assertion to perform on bound_subjects. | | groups_attribute | str | The attribute to use to identify the set of groups to which the user belongs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope Unique name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where SAML Auth engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mapping of attribute names to values that are expected to exist in the SAML assertion. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of matching assertion to perform on bound_attributes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The subject being asserted for SAML authentication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of matching assertion to perform on bound_subjects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The attribute to use to identify the set of groups to which the user belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -221,7 +221,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} --- @@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} --- @@ -896,7 +896,7 @@ The construct id used in the generated config for the SamlAuthBackendRole to imp The id of the existing SamlAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1541,7 +1541,7 @@ samlAuthBackendRole.SamlAuthBackendRoleConfig( | bound_subjects | typing.List[str] | The subject being asserted for SAML authentication. | | bound_subjects_type | str | The type of matching assertion to perform on bound_subjects. | | groups_attribute | str | The attribute to use to identify the set of groups to which the user belongs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1635,7 +1635,7 @@ name: str Unique name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} --- @@ -1649,7 +1649,7 @@ path: str Path where SAML Auth engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} --- @@ -1663,7 +1663,7 @@ bound_attributes: typing.Mapping[str] Mapping of attribute names to values that are expected to exist in the SAML assertion. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} --- @@ -1677,7 +1677,7 @@ bound_attributes_type: str The type of matching assertion to perform on bound_attributes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} --- @@ -1691,7 +1691,7 @@ bound_subjects: typing.List[str] The subject being asserted for SAML authentication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} --- @@ -1705,7 +1705,7 @@ bound_subjects_type: str The type of matching assertion to perform on bound_subjects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} --- @@ -1719,7 +1719,7 @@ groups_attribute: str The attribute to use to identify the set of groups to which the user belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} --- @@ -1731,7 +1731,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1748,7 +1748,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} --- @@ -1762,7 +1762,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} --- @@ -1776,7 +1776,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} --- @@ -1790,7 +1790,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} --- @@ -1804,7 +1804,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} --- @@ -1818,7 +1818,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} --- @@ -1832,7 +1832,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} --- @@ -1846,7 +1846,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} --- @@ -1860,7 +1860,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} --- @@ -1874,7 +1874,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} --- diff --git a/docs/samlAuthBackendRole.typescript.md b/docs/samlAuthBackendRole.typescript.md index 127547a6..83ed35b4 100644 --- a/docs/samlAuthBackendRole.typescript.md +++ b/docs/samlAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### SamlAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the SamlAuthBackendRole to imp The id of the existing SamlAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1198,7 +1198,7 @@ const samlAuthBackendRoleConfig: samlAuthBackendRole.SamlAuthBackendRoleConfig = | boundSubjects | string[] | The subject being asserted for SAML authentication. | | boundSubjectsType | string | The type of matching assertion to perform on bound_subjects. | | groupsAttribute | string | The attribute to use to identify the set of groups to which the user belongs. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1292,7 +1292,7 @@ public readonly name: string; Unique name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} --- @@ -1306,7 +1306,7 @@ public readonly path: string; Path where SAML Auth engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} --- @@ -1320,7 +1320,7 @@ public readonly boundAttributes: {[ key: string ]: string}; Mapping of attribute names to values that are expected to exist in the SAML assertion. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} --- @@ -1334,7 +1334,7 @@ public readonly boundAttributesType: string; The type of matching assertion to perform on bound_attributes. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} --- @@ -1348,7 +1348,7 @@ public readonly boundSubjects: string[]; The subject being asserted for SAML authentication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} --- @@ -1362,7 +1362,7 @@ public readonly boundSubjectsType: string; The type of matching assertion to perform on bound_subjects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} --- @@ -1376,7 +1376,7 @@ public readonly groupsAttribute: string; The attribute to use to identify the set of groups to which the user belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} --- @@ -1388,7 +1388,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1405,7 +1405,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} --- @@ -1419,7 +1419,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} --- @@ -1433,7 +1433,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} --- @@ -1447,7 +1447,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} --- @@ -1461,7 +1461,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} --- @@ -1475,7 +1475,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} --- @@ -1489,7 +1489,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} --- @@ -1503,7 +1503,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} --- @@ -1517,7 +1517,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} --- @@ -1531,7 +1531,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} --- diff --git a/docs/secretsSyncAssociation.csharp.md b/docs/secretsSyncAssociation.csharp.md index 49ce8237..64cf3d26 100644 --- a/docs/secretsSyncAssociation.csharp.md +++ b/docs/secretsSyncAssociation.csharp.md @@ -4,7 +4,7 @@ ### SecretsSyncAssociation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the SecretsSyncAssociation to The id of the existing SecretsSyncAssociation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use --- @@ -869,7 +869,7 @@ new SecretsSyncAssociationConfig { | Name | string | Name of the destination. | | SecretName | string | Specifies the name of the secret to synchronize. | | Type | string | Type of sync destination. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -954,7 +954,7 @@ public string Mount { get; set; } Specifies the mount where the secret is located. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} --- @@ -968,7 +968,7 @@ public string Name { get; set; } Name of the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} --- @@ -982,7 +982,7 @@ public string SecretName { get; set; } Specifies the name of the secret to synchronize. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} --- @@ -996,7 +996,7 @@ public string Type { get; set; } Type of sync destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} --- @@ -1008,7 +1008,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1025,7 +1025,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} --- diff --git a/docs/secretsSyncAssociation.go.md b/docs/secretsSyncAssociation.go.md index 0ce7e10e..bc608890 100644 --- a/docs/secretsSyncAssociation.go.md +++ b/docs/secretsSyncAssociation.go.md @@ -4,12 +4,12 @@ ### SecretsSyncAssociation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncassociation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncassociation" secretssyncassociation.NewSecretsSyncAssociation(scope Construct, id *string, config SecretsSyncAssociationConfig) SecretsSyncAssociation ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncassociation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncassociation" secretssyncassociation.SecretsSyncAssociation_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncassociation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncassociation" secretssyncassociation.SecretsSyncAssociation_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ secretssyncassociation.SecretsSyncAssociation_IsTerraformElement(x interface{}) ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncassociation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncassociation" secretssyncassociation.SecretsSyncAssociation_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ secretssyncassociation.SecretsSyncAssociation_IsTerraformResource(x interface{}) ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncassociation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncassociation" secretssyncassociation.SecretsSyncAssociation_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the SecretsSyncAssociation to The id of the existing SecretsSyncAssociation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use --- @@ -835,7 +835,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncassociation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncassociation" &secretssyncassociation.SecretsSyncAssociationConfig { Connection: interface{}, @@ -869,7 +869,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncassociatio | Name | *string | Name of the destination. | | SecretName | *string | Specifies the name of the secret to synchronize. | | Type | *string | Type of sync destination. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -954,7 +954,7 @@ Mount *string Specifies the mount where the secret is located. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} --- @@ -968,7 +968,7 @@ Name *string Name of the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} --- @@ -982,7 +982,7 @@ SecretName *string Specifies the name of the secret to synchronize. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} --- @@ -996,7 +996,7 @@ Type *string Type of sync destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} --- @@ -1008,7 +1008,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1025,7 +1025,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} --- diff --git a/docs/secretsSyncAssociation.java.md b/docs/secretsSyncAssociation.java.md index df6494cb..7b35c496 100644 --- a/docs/secretsSyncAssociation.java.md +++ b/docs/secretsSyncAssociation.java.md @@ -4,7 +4,7 @@ ### SecretsSyncAssociation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. #### Initializers @@ -47,7 +47,7 @@ SecretsSyncAssociation.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Name of the destination. | | secretName | java.lang.String | Specifies the name of the secret to synchronize. | | type | java.lang.String | Type of sync destination. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Specifies the mount where the secret is located. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the name of the secret to synchronize. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of sync destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} --- @@ -610,7 +610,7 @@ The construct id used in the generated config for the SecretsSyncAssociation to The id of the existing SecretsSyncAssociation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use --- @@ -1002,7 +1002,7 @@ SecretsSyncAssociationConfig.builder() | name | java.lang.String | Name of the destination. | | secretName | java.lang.String | Specifies the name of the secret to synchronize. | | type | java.lang.String | Type of sync destination. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1087,7 +1087,7 @@ public java.lang.String getMount(); Specifies the mount where the secret is located. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} --- @@ -1101,7 +1101,7 @@ public java.lang.String getName(); Name of the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} --- @@ -1115,7 +1115,7 @@ public java.lang.String getSecretName(); Specifies the name of the secret to synchronize. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} --- @@ -1129,7 +1129,7 @@ public java.lang.String getType(); Type of sync destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} --- @@ -1141,7 +1141,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1158,7 +1158,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} --- diff --git a/docs/secretsSyncAssociation.python.md b/docs/secretsSyncAssociation.python.md index f049305d..9b3db944 100644 --- a/docs/secretsSyncAssociation.python.md +++ b/docs/secretsSyncAssociation.python.md @@ -4,7 +4,7 @@ ### SecretsSyncAssociation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. #### Initializers @@ -45,7 +45,7 @@ secretsSyncAssociation.SecretsSyncAssociation( | name | str | Name of the destination. | | secret_name | str | Specifies the name of the secret to synchronize. | | type | str | Type of sync destination. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Specifies the mount where the secret is located. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the name of the secret to synchronize. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of sync destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} --- @@ -654,7 +654,7 @@ The construct id used in the generated config for the SecretsSyncAssociation to The id of the existing SecretsSyncAssociation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use --- @@ -1042,7 +1042,7 @@ secretsSyncAssociation.SecretsSyncAssociationConfig( | name | str | Name of the destination. | | secret_name | str | Specifies the name of the secret to synchronize. | | type | str | Type of sync destination. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1127,7 +1127,7 @@ mount: str Specifies the mount where the secret is located. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} --- @@ -1141,7 +1141,7 @@ name: str Name of the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} --- @@ -1155,7 +1155,7 @@ secret_name: str Specifies the name of the secret to synchronize. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} --- @@ -1169,7 +1169,7 @@ type: str Type of sync destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} --- @@ -1181,7 +1181,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1198,7 +1198,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} --- diff --git a/docs/secretsSyncAssociation.typescript.md b/docs/secretsSyncAssociation.typescript.md index c54667e9..ee24c81e 100644 --- a/docs/secretsSyncAssociation.typescript.md +++ b/docs/secretsSyncAssociation.typescript.md @@ -4,7 +4,7 @@ ### SecretsSyncAssociation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association vault_secrets_sync_association}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the SecretsSyncAssociation to The id of the existing SecretsSyncAssociation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use --- @@ -855,7 +855,7 @@ const secretsSyncAssociationConfig: secretsSyncAssociation.SecretsSyncAssociatio | name | string | Name of the destination. | | secretName | string | Specifies the name of the secret to synchronize. | | type | string | Type of sync destination. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -940,7 +940,7 @@ public readonly mount: string; Specifies the mount where the secret is located. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} --- @@ -954,7 +954,7 @@ public readonly name: string; Name of the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} --- @@ -968,7 +968,7 @@ public readonly secretName: string; Specifies the name of the secret to synchronize. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} --- @@ -982,7 +982,7 @@ public readonly type: string; Type of sync destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} --- @@ -994,7 +994,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1011,7 +1011,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} --- diff --git a/docs/secretsSyncAwsDestination.csharp.md b/docs/secretsSyncAwsDestination.csharp.md index d00f674c..02b7d87b 100644 --- a/docs/secretsSyncAwsDestination.csharp.md +++ b/docs/secretsSyncAwsDestination.csharp.md @@ -4,7 +4,7 @@ ### SecretsSyncAwsDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. #### Initializers @@ -75,9 +75,11 @@ Must be unique amongst siblings in the same scope | MoveToId | Moves this resource to the resource corresponding to "id". | | ResetAccessKeyId | *No description.* | | ResetCustomTags | *No description.* | +| ResetExternalId | *No description.* | | ResetId | *No description.* | | ResetNamespace | *No description.* | | ResetRegion | *No description.* | +| ResetRoleArn | *No description.* | | ResetSecretAccessKey | *No description.* | | ResetSecretNameTemplate | *No description.* | @@ -383,6 +385,12 @@ private void ResetAccessKeyId() private void ResetCustomTags() ``` +##### `ResetExternalId` + +```csharp +private void ResetExternalId() +``` + ##### `ResetId` ```csharp @@ -401,6 +409,12 @@ private void ResetNamespace() private void ResetRegion() ``` +##### `ResetRoleArn` + +```csharp +private void ResetRoleArn() +``` + ##### `ResetSecretAccessKey` ```csharp @@ -516,7 +530,7 @@ The construct id used in the generated config for the SecretsSyncAwsDestination The id of the existing SecretsSyncAwsDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use --- @@ -549,18 +563,22 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Type | string | *No description.* | | AccessKeyIdInput | string | *No description.* | | CustomTagsInput | System.Collections.Generic.IDictionary | *No description.* | +| ExternalIdInput | string | *No description.* | | IdInput | string | *No description.* | | NameInput | string | *No description.* | | NamespaceInput | string | *No description.* | | RegionInput | string | *No description.* | +| RoleArnInput | string | *No description.* | | SecretAccessKeyInput | string | *No description.* | | SecretNameTemplateInput | string | *No description.* | | AccessKeyId | string | *No description.* | | CustomTags | System.Collections.Generic.IDictionary | *No description.* | +| ExternalId | string | *No description.* | | Id | string | *No description.* | | Name | string | *No description.* | | Namespace | string | *No description.* | | Region | string | *No description.* | +| RoleArn | string | *No description.* | | SecretAccessKey | string | *No description.* | | SecretNameTemplate | string | *No description.* | @@ -738,6 +756,16 @@ public System.Collections.Generic.IDictionary CustomTagsInput { --- +##### `ExternalIdInput`Optional + +```csharp +public string ExternalIdInput { get; } +``` + +- *Type:* string + +--- + ##### `IdInput`Optional ```csharp @@ -778,6 +806,16 @@ public string RegionInput { get; } --- +##### `RoleArnInput`Optional + +```csharp +public string RoleArnInput { get; } +``` + +- *Type:* string + +--- + ##### `SecretAccessKeyInput`Optional ```csharp @@ -818,6 +856,16 @@ public System.Collections.Generic.IDictionary CustomTags { get; --- +##### `ExternalId`Required + +```csharp +public string ExternalId { get; } +``` + +- *Type:* string + +--- + ##### `Id`Required ```csharp @@ -858,6 +906,16 @@ public string Region { get; } --- +##### `RoleArn`Required + +```csharp +public string RoleArn { get; } +``` + +- *Type:* string + +--- + ##### `SecretAccessKey`Required ```csharp @@ -916,9 +974,11 @@ new SecretsSyncAwsDestinationConfig { string Name, string AccessKeyId = null, System.Collections.Generic.IDictionary CustomTags = null, + string ExternalId = null, string Id = null, string Namespace = null, string Region = null, + string RoleArn = null, string SecretAccessKey = null, string SecretNameTemplate = null }; @@ -938,9 +998,11 @@ new SecretsSyncAwsDestinationConfig { | Name | string | Unique name of the AWS destination. | | AccessKeyId | string | Access key id to authenticate against the AWS secrets manager. | | CustomTags | System.Collections.Generic.IDictionary | Custom tags to set on the secret managed at the destination. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | +| ExternalId | string | Extra protection that must match the trust policy granting access to the AWS IAM role ARN. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Region | string | Region where to manage the secrets manager entries. | +| RoleArn | string | Specifies a role to assume when connecting to AWS. | | SecretAccessKey | string | Secret access key to authenticate against the AWS secrets manager. | | SecretNameTemplate | string | Template describing how to generate external secret names. | @@ -1026,7 +1088,7 @@ public string Name { get; set; } Unique name of the AWS destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} --- @@ -1040,7 +1102,7 @@ public string AccessKeyId { get; set; } Access key id to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} --- @@ -1054,7 +1116,21 @@ public System.Collections.Generic.IDictionary CustomTags { get; Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} + +--- + +##### `ExternalId`Optional + +```csharp +public string ExternalId { get; set; } +``` + +- *Type:* string + +Extra protection that must match the trust policy granting access to the AWS IAM role ARN. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#external_id SecretsSyncAwsDestination#external_id} --- @@ -1066,7 +1142,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1083,7 +1159,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} --- @@ -1097,7 +1173,21 @@ public string Region { get; set; } Region where to manage the secrets manager entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} + +--- + +##### `RoleArn`Optional + +```csharp +public string RoleArn { get; set; } +``` + +- *Type:* string + +Specifies a role to assume when connecting to AWS. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#role_arn SecretsSyncAwsDestination#role_arn} --- @@ -1111,7 +1201,7 @@ public string SecretAccessKey { get; set; } Secret access key to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} --- @@ -1125,7 +1215,7 @@ public string SecretNameTemplate { get; set; } Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} --- diff --git a/docs/secretsSyncAwsDestination.go.md b/docs/secretsSyncAwsDestination.go.md index a09946ad..ce31c319 100644 --- a/docs/secretsSyncAwsDestination.go.md +++ b/docs/secretsSyncAwsDestination.go.md @@ -4,12 +4,12 @@ ### SecretsSyncAwsDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncawsdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncawsdestination" secretssyncawsdestination.NewSecretsSyncAwsDestination(scope Construct, id *string, config SecretsSyncAwsDestinationConfig) SecretsSyncAwsDestination ``` @@ -75,9 +75,11 @@ Must be unique amongst siblings in the same scope | MoveToId | Moves this resource to the resource corresponding to "id". | | ResetAccessKeyId | *No description.* | | ResetCustomTags | *No description.* | +| ResetExternalId | *No description.* | | ResetId | *No description.* | | ResetNamespace | *No description.* | | ResetRegion | *No description.* | +| ResetRoleArn | *No description.* | | ResetSecretAccessKey | *No description.* | | ResetSecretNameTemplate | *No description.* | @@ -383,6 +385,12 @@ func ResetAccessKeyId() func ResetCustomTags() ``` +##### `ResetExternalId` + +```go +func ResetExternalId() +``` + ##### `ResetId` ```go @@ -401,6 +409,12 @@ func ResetNamespace() func ResetRegion() ``` +##### `ResetRoleArn` + +```go +func ResetRoleArn() +``` + ##### `ResetSecretAccessKey` ```go @@ -427,7 +441,7 @@ func ResetSecretNameTemplate() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncawsdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncawsdestination" secretssyncawsdestination.SecretsSyncAwsDestination_IsConstruct(x interface{}) *bool ``` @@ -459,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncawsdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncawsdestination" secretssyncawsdestination.SecretsSyncAwsDestination_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +487,7 @@ secretssyncawsdestination.SecretsSyncAwsDestination_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncawsdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncawsdestination" secretssyncawsdestination.SecretsSyncAwsDestination_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +501,7 @@ secretssyncawsdestination.SecretsSyncAwsDestination_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncawsdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncawsdestination" secretssyncawsdestination.SecretsSyncAwsDestination_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -516,7 +530,7 @@ The construct id used in the generated config for the SecretsSyncAwsDestination The id of the existing SecretsSyncAwsDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use --- @@ -549,18 +563,22 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Type | *string | *No description.* | | AccessKeyIdInput | *string | *No description.* | | CustomTagsInput | *map[string]*string | *No description.* | +| ExternalIdInput | *string | *No description.* | | IdInput | *string | *No description.* | | NameInput | *string | *No description.* | | NamespaceInput | *string | *No description.* | | RegionInput | *string | *No description.* | +| RoleArnInput | *string | *No description.* | | SecretAccessKeyInput | *string | *No description.* | | SecretNameTemplateInput | *string | *No description.* | | AccessKeyId | *string | *No description.* | | CustomTags | *map[string]*string | *No description.* | +| ExternalId | *string | *No description.* | | Id | *string | *No description.* | | Name | *string | *No description.* | | Namespace | *string | *No description.* | | Region | *string | *No description.* | +| RoleArn | *string | *No description.* | | SecretAccessKey | *string | *No description.* | | SecretNameTemplate | *string | *No description.* | @@ -738,6 +756,16 @@ func CustomTagsInput() *map[string]*string --- +##### `ExternalIdInput`Optional + +```go +func ExternalIdInput() *string +``` + +- *Type:* *string + +--- + ##### `IdInput`Optional ```go @@ -778,6 +806,16 @@ func RegionInput() *string --- +##### `RoleArnInput`Optional + +```go +func RoleArnInput() *string +``` + +- *Type:* *string + +--- + ##### `SecretAccessKeyInput`Optional ```go @@ -818,6 +856,16 @@ func CustomTags() *map[string]*string --- +##### `ExternalId`Required + +```go +func ExternalId() *string +``` + +- *Type:* *string + +--- + ##### `Id`Required ```go @@ -858,6 +906,16 @@ func Region() *string --- +##### `RoleArn`Required + +```go +func RoleArn() *string +``` + +- *Type:* *string + +--- + ##### `SecretAccessKey`Required ```go @@ -903,7 +961,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncawsdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncawsdestination" &secretssyncawsdestination.SecretsSyncAwsDestinationConfig { Connection: interface{}, @@ -916,9 +974,11 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncawsdestina Name: *string, AccessKeyId: *string, CustomTags: *map[string]*string, + ExternalId: *string, Id: *string, Namespace: *string, Region: *string, + RoleArn: *string, SecretAccessKey: *string, SecretNameTemplate: *string, } @@ -938,9 +998,11 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncawsdestina | Name | *string | Unique name of the AWS destination. | | AccessKeyId | *string | Access key id to authenticate against the AWS secrets manager. | | CustomTags | *map[string]*string | Custom tags to set on the secret managed at the destination. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | +| ExternalId | *string | Extra protection that must match the trust policy granting access to the AWS IAM role ARN. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Region | *string | Region where to manage the secrets manager entries. | +| RoleArn | *string | Specifies a role to assume when connecting to AWS. | | SecretAccessKey | *string | Secret access key to authenticate against the AWS secrets manager. | | SecretNameTemplate | *string | Template describing how to generate external secret names. | @@ -1026,7 +1088,7 @@ Name *string Unique name of the AWS destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} --- @@ -1040,7 +1102,7 @@ AccessKeyId *string Access key id to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} --- @@ -1054,7 +1116,21 @@ CustomTags *map[string]*string Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} + +--- + +##### `ExternalId`Optional + +```go +ExternalId *string +``` + +- *Type:* *string + +Extra protection that must match the trust policy granting access to the AWS IAM role ARN. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#external_id SecretsSyncAwsDestination#external_id} --- @@ -1066,7 +1142,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1083,7 +1159,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} --- @@ -1097,7 +1173,21 @@ Region *string Region where to manage the secrets manager entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} + +--- + +##### `RoleArn`Optional + +```go +RoleArn *string +``` + +- *Type:* *string + +Specifies a role to assume when connecting to AWS. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#role_arn SecretsSyncAwsDestination#role_arn} --- @@ -1111,7 +1201,7 @@ SecretAccessKey *string Secret access key to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} --- @@ -1125,7 +1215,7 @@ SecretNameTemplate *string Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} --- diff --git a/docs/secretsSyncAwsDestination.java.md b/docs/secretsSyncAwsDestination.java.md index 3b53b87d..20b7aea0 100644 --- a/docs/secretsSyncAwsDestination.java.md +++ b/docs/secretsSyncAwsDestination.java.md @@ -4,7 +4,7 @@ ### SecretsSyncAwsDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. #### Initializers @@ -26,9 +26,11 @@ SecretsSyncAwsDestination.Builder.create(Construct scope, java.lang.String id) .name(java.lang.String) // .accessKeyId(java.lang.String) // .customTags(java.util.Map) +// .externalId(java.lang.String) // .id(java.lang.String) // .namespace(java.lang.String) // .region(java.lang.String) +// .roleArn(java.lang.String) // .secretAccessKey(java.lang.String) // .secretNameTemplate(java.lang.String) .build(); @@ -48,9 +50,11 @@ SecretsSyncAwsDestination.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Unique name of the AWS destination. | | accessKeyId | java.lang.String | Access key id to authenticate against the AWS secrets manager. | | customTags | java.util.Map | Custom tags to set on the secret managed at the destination. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | +| externalId | java.lang.String | Extra protection that must match the trust policy granting access to the AWS IAM role ARN. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | region | java.lang.String | Region where to manage the secrets manager entries. | +| roleArn | java.lang.String | Specifies a role to assume when connecting to AWS. | | secretAccessKey | java.lang.String | Secret access key to authenticate against the AWS secrets manager. | | secretNameTemplate | java.lang.String | Template describing how to generate external secret names. | @@ -122,7 +126,7 @@ Must be unique amongst siblings in the same scope Unique name of the AWS destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} --- @@ -132,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Access key id to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} --- @@ -142,7 +146,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} + +--- + +##### `externalId`Optional + +- *Type:* java.lang.String + +Extra protection that must match the trust policy granting access to the AWS IAM role ARN. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#external_id SecretsSyncAwsDestination#external_id} --- @@ -150,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} --- @@ -173,7 +187,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region where to manage the secrets manager entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} + +--- + +##### `roleArn`Optional + +- *Type:* java.lang.String + +Specifies a role to assume when connecting to AWS. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#role_arn SecretsSyncAwsDestination#role_arn} --- @@ -183,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret access key to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} --- @@ -193,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} --- @@ -226,9 +250,11 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | moveToId | Moves this resource to the resource corresponding to "id". | | resetAccessKeyId | *No description.* | | resetCustomTags | *No description.* | +| resetExternalId | *No description.* | | resetId | *No description.* | | resetNamespace | *No description.* | | resetRegion | *No description.* | +| resetRoleArn | *No description.* | | resetSecretAccessKey | *No description.* | | resetSecretNameTemplate | *No description.* | @@ -536,6 +562,12 @@ public void resetAccessKeyId() public void resetCustomTags() ``` +##### `resetExternalId` + +```java +public void resetExternalId() +``` + ##### `resetId` ```java @@ -554,6 +586,12 @@ public void resetNamespace() public void resetRegion() ``` +##### `resetRoleArn` + +```java +public void resetRoleArn() +``` + ##### `resetSecretAccessKey` ```java @@ -669,7 +707,7 @@ The construct id used in the generated config for the SecretsSyncAwsDestination The id of the existing SecretsSyncAwsDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use --- @@ -702,18 +740,22 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | type | java.lang.String | *No description.* | | accessKeyIdInput | java.lang.String | *No description.* | | customTagsInput | java.util.Map | *No description.* | +| externalIdInput | java.lang.String | *No description.* | | idInput | java.lang.String | *No description.* | | nameInput | java.lang.String | *No description.* | | namespaceInput | java.lang.String | *No description.* | | regionInput | java.lang.String | *No description.* | +| roleArnInput | java.lang.String | *No description.* | | secretAccessKeyInput | java.lang.String | *No description.* | | secretNameTemplateInput | java.lang.String | *No description.* | | accessKeyId | java.lang.String | *No description.* | | customTags | java.util.Map | *No description.* | +| externalId | java.lang.String | *No description.* | | id | java.lang.String | *No description.* | | name | java.lang.String | *No description.* | | namespace | java.lang.String | *No description.* | | region | java.lang.String | *No description.* | +| roleArn | java.lang.String | *No description.* | | secretAccessKey | java.lang.String | *No description.* | | secretNameTemplate | java.lang.String | *No description.* | @@ -891,6 +933,16 @@ public java.util.Map getCustomTagsInput(); --- +##### `externalIdInput`Optional + +```java +public java.lang.String getExternalIdInput(); +``` + +- *Type:* java.lang.String + +--- + ##### `idInput`Optional ```java @@ -931,6 +983,16 @@ public java.lang.String getRegionInput(); --- +##### `roleArnInput`Optional + +```java +public java.lang.String getRoleArnInput(); +``` + +- *Type:* java.lang.String + +--- + ##### `secretAccessKeyInput`Optional ```java @@ -971,6 +1033,16 @@ public java.util.Map getCustomTags(); --- +##### `externalId`Required + +```java +public java.lang.String getExternalId(); +``` + +- *Type:* java.lang.String + +--- + ##### `id`Required ```java @@ -1011,6 +1083,16 @@ public java.lang.String getRegion(); --- +##### `roleArn`Required + +```java +public java.lang.String getRoleArn(); +``` + +- *Type:* java.lang.String + +--- + ##### `secretAccessKey`Required ```java @@ -1073,9 +1155,11 @@ SecretsSyncAwsDestinationConfig.builder() .name(java.lang.String) // .accessKeyId(java.lang.String) // .customTags(java.util.Map) +// .externalId(java.lang.String) // .id(java.lang.String) // .namespace(java.lang.String) // .region(java.lang.String) +// .roleArn(java.lang.String) // .secretAccessKey(java.lang.String) // .secretNameTemplate(java.lang.String) .build(); @@ -1095,9 +1179,11 @@ SecretsSyncAwsDestinationConfig.builder() | name | java.lang.String | Unique name of the AWS destination. | | accessKeyId | java.lang.String | Access key id to authenticate against the AWS secrets manager. | | customTags | java.util.Map | Custom tags to set on the secret managed at the destination. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | +| externalId | java.lang.String | Extra protection that must match the trust policy granting access to the AWS IAM role ARN. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | region | java.lang.String | Region where to manage the secrets manager entries. | +| roleArn | java.lang.String | Specifies a role to assume when connecting to AWS. | | secretAccessKey | java.lang.String | Secret access key to authenticate against the AWS secrets manager. | | secretNameTemplate | java.lang.String | Template describing how to generate external secret names. | @@ -1183,7 +1269,7 @@ public java.lang.String getName(); Unique name of the AWS destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} --- @@ -1197,7 +1283,7 @@ public java.lang.String getAccessKeyId(); Access key id to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} --- @@ -1211,7 +1297,21 @@ public java.util.Map getCustomTags(); Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} + +--- + +##### `externalId`Optional + +```java +public java.lang.String getExternalId(); +``` + +- *Type:* java.lang.String + +Extra protection that must match the trust policy granting access to the AWS IAM role ARN. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#external_id SecretsSyncAwsDestination#external_id} --- @@ -1223,7 +1323,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1240,7 +1340,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} --- @@ -1254,7 +1354,21 @@ public java.lang.String getRegion(); Region where to manage the secrets manager entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} + +--- + +##### `roleArn`Optional + +```java +public java.lang.String getRoleArn(); +``` + +- *Type:* java.lang.String + +Specifies a role to assume when connecting to AWS. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#role_arn SecretsSyncAwsDestination#role_arn} --- @@ -1268,7 +1382,7 @@ public java.lang.String getSecretAccessKey(); Secret access key to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} --- @@ -1282,7 +1396,7 @@ public java.lang.String getSecretNameTemplate(); Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} --- diff --git a/docs/secretsSyncAwsDestination.python.md b/docs/secretsSyncAwsDestination.python.md index c68d069a..2427de89 100644 --- a/docs/secretsSyncAwsDestination.python.md +++ b/docs/secretsSyncAwsDestination.python.md @@ -4,7 +4,7 @@ ### SecretsSyncAwsDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. #### Initializers @@ -24,9 +24,11 @@ secretsSyncAwsDestination.SecretsSyncAwsDestination( name: str, access_key_id: str = None, custom_tags: typing.Mapping[str] = None, + external_id: str = None, id: str = None, namespace: str = None, region: str = None, + role_arn: str = None, secret_access_key: str = None, secret_name_template: str = None ) @@ -46,9 +48,11 @@ secretsSyncAwsDestination.SecretsSyncAwsDestination( | name | str | Unique name of the AWS destination. | | access_key_id | str | Access key id to authenticate against the AWS secrets manager. | | custom_tags | typing.Mapping[str] | Custom tags to set on the secret managed at the destination. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | +| external_id | str | Extra protection that must match the trust policy granting access to the AWS IAM role ARN. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | | namespace | str | Target namespace. (requires Enterprise). | | region | str | Region where to manage the secrets manager entries. | +| role_arn | str | Specifies a role to assume when connecting to AWS. | | secret_access_key | str | Secret access key to authenticate against the AWS secrets manager. | | secret_name_template | str | Template describing how to generate external secret names. | @@ -120,7 +124,7 @@ Must be unique amongst siblings in the same scope Unique name of the AWS destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} --- @@ -130,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Access key id to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} --- @@ -140,7 +144,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} + +--- + +##### `external_id`Optional + +- *Type:* str + +Extra protection that must match the trust policy granting access to the AWS IAM role ARN. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#external_id SecretsSyncAwsDestination#external_id} --- @@ -148,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +175,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} --- @@ -171,7 +185,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region where to manage the secrets manager entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} + +--- + +##### `role_arn`Optional + +- *Type:* str + +Specifies a role to assume when connecting to AWS. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#role_arn SecretsSyncAwsDestination#role_arn} --- @@ -181,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret access key to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} --- @@ -191,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} --- @@ -224,9 +248,11 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | move_to_id | Moves this resource to the resource corresponding to "id". | | reset_access_key_id | *No description.* | | reset_custom_tags | *No description.* | +| reset_external_id | *No description.* | | reset_id | *No description.* | | reset_namespace | *No description.* | | reset_region | *No description.* | +| reset_role_arn | *No description.* | | reset_secret_access_key | *No description.* | | reset_secret_name_template | *No description.* | @@ -569,6 +595,12 @@ def reset_access_key_id() -> None def reset_custom_tags() -> None ``` +##### `reset_external_id` + +```python +def reset_external_id() -> None +``` + ##### `reset_id` ```python @@ -587,6 +619,12 @@ def reset_namespace() -> None def reset_region() -> None ``` +##### `reset_role_arn` + +```python +def reset_role_arn() -> None +``` + ##### `reset_secret_access_key` ```python @@ -713,7 +751,7 @@ The construct id used in the generated config for the SecretsSyncAwsDestination The id of the existing SecretsSyncAwsDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use --- @@ -746,18 +784,22 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | type | str | *No description.* | | access_key_id_input | str | *No description.* | | custom_tags_input | typing.Mapping[str] | *No description.* | +| external_id_input | str | *No description.* | | id_input | str | *No description.* | | name_input | str | *No description.* | | namespace_input | str | *No description.* | | region_input | str | *No description.* | +| role_arn_input | str | *No description.* | | secret_access_key_input | str | *No description.* | | secret_name_template_input | str | *No description.* | | access_key_id | str | *No description.* | | custom_tags | typing.Mapping[str] | *No description.* | +| external_id | str | *No description.* | | id | str | *No description.* | | name | str | *No description.* | | namespace | str | *No description.* | | region | str | *No description.* | +| role_arn | str | *No description.* | | secret_access_key | str | *No description.* | | secret_name_template | str | *No description.* | @@ -935,6 +977,16 @@ custom_tags_input: typing.Mapping[str] --- +##### `external_id_input`Optional + +```python +external_id_input: str +``` + +- *Type:* str + +--- + ##### `id_input`Optional ```python @@ -975,6 +1027,16 @@ region_input: str --- +##### `role_arn_input`Optional + +```python +role_arn_input: str +``` + +- *Type:* str + +--- + ##### `secret_access_key_input`Optional ```python @@ -1015,6 +1077,16 @@ custom_tags: typing.Mapping[str] --- +##### `external_id`Required + +```python +external_id: str +``` + +- *Type:* str + +--- + ##### `id`Required ```python @@ -1055,6 +1127,16 @@ region: str --- +##### `role_arn`Required + +```python +role_arn: str +``` + +- *Type:* str + +--- + ##### `secret_access_key`Required ```python @@ -1113,9 +1195,11 @@ secretsSyncAwsDestination.SecretsSyncAwsDestinationConfig( name: str, access_key_id: str = None, custom_tags: typing.Mapping[str] = None, + external_id: str = None, id: str = None, namespace: str = None, region: str = None, + role_arn: str = None, secret_access_key: str = None, secret_name_template: str = None ) @@ -1135,9 +1219,11 @@ secretsSyncAwsDestination.SecretsSyncAwsDestinationConfig( | name | str | Unique name of the AWS destination. | | access_key_id | str | Access key id to authenticate against the AWS secrets manager. | | custom_tags | typing.Mapping[str] | Custom tags to set on the secret managed at the destination. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | +| external_id | str | Extra protection that must match the trust policy granting access to the AWS IAM role ARN. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | | namespace | str | Target namespace. (requires Enterprise). | | region | str | Region where to manage the secrets manager entries. | +| role_arn | str | Specifies a role to assume when connecting to AWS. | | secret_access_key | str | Secret access key to authenticate against the AWS secrets manager. | | secret_name_template | str | Template describing how to generate external secret names. | @@ -1223,7 +1309,7 @@ name: str Unique name of the AWS destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} --- @@ -1237,7 +1323,7 @@ access_key_id: str Access key id to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} --- @@ -1251,7 +1337,21 @@ custom_tags: typing.Mapping[str] Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} + +--- + +##### `external_id`Optional + +```python +external_id: str +``` + +- *Type:* str + +Extra protection that must match the trust policy granting access to the AWS IAM role ARN. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#external_id SecretsSyncAwsDestination#external_id} --- @@ -1263,7 +1363,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1280,7 +1380,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} --- @@ -1294,7 +1394,21 @@ region: str Region where to manage the secrets manager entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} + +--- + +##### `role_arn`Optional + +```python +role_arn: str +``` + +- *Type:* str + +Specifies a role to assume when connecting to AWS. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#role_arn SecretsSyncAwsDestination#role_arn} --- @@ -1308,7 +1422,7 @@ secret_access_key: str Secret access key to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} --- @@ -1322,7 +1436,7 @@ secret_name_template: str Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} --- diff --git a/docs/secretsSyncAwsDestination.typescript.md b/docs/secretsSyncAwsDestination.typescript.md index 35f00780..f4f44729 100644 --- a/docs/secretsSyncAwsDestination.typescript.md +++ b/docs/secretsSyncAwsDestination.typescript.md @@ -4,7 +4,7 @@ ### SecretsSyncAwsDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination}. #### Initializers @@ -75,9 +75,11 @@ Must be unique amongst siblings in the same scope | moveToId | Moves this resource to the resource corresponding to "id". | | resetAccessKeyId | *No description.* | | resetCustomTags | *No description.* | +| resetExternalId | *No description.* | | resetId | *No description.* | | resetNamespace | *No description.* | | resetRegion | *No description.* | +| resetRoleArn | *No description.* | | resetSecretAccessKey | *No description.* | | resetSecretNameTemplate | *No description.* | @@ -383,6 +385,12 @@ public resetAccessKeyId(): void public resetCustomTags(): void ``` +##### `resetExternalId` + +```typescript +public resetExternalId(): void +``` + ##### `resetId` ```typescript @@ -401,6 +409,12 @@ public resetNamespace(): void public resetRegion(): void ``` +##### `resetRoleArn` + +```typescript +public resetRoleArn(): void +``` + ##### `resetSecretAccessKey` ```typescript @@ -516,7 +530,7 @@ The construct id used in the generated config for the SecretsSyncAwsDestination The id of the existing SecretsSyncAwsDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use --- @@ -549,18 +563,22 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | type | string | *No description.* | | accessKeyIdInput | string | *No description.* | | customTagsInput | {[ key: string ]: string} | *No description.* | +| externalIdInput | string | *No description.* | | idInput | string | *No description.* | | nameInput | string | *No description.* | | namespaceInput | string | *No description.* | | regionInput | string | *No description.* | +| roleArnInput | string | *No description.* | | secretAccessKeyInput | string | *No description.* | | secretNameTemplateInput | string | *No description.* | | accessKeyId | string | *No description.* | | customTags | {[ key: string ]: string} | *No description.* | +| externalId | string | *No description.* | | id | string | *No description.* | | name | string | *No description.* | | namespace | string | *No description.* | | region | string | *No description.* | +| roleArn | string | *No description.* | | secretAccessKey | string | *No description.* | | secretNameTemplate | string | *No description.* | @@ -738,6 +756,16 @@ public readonly customTagsInput: {[ key: string ]: string}; --- +##### `externalIdInput`Optional + +```typescript +public readonly externalIdInput: string; +``` + +- *Type:* string + +--- + ##### `idInput`Optional ```typescript @@ -778,6 +806,16 @@ public readonly regionInput: string; --- +##### `roleArnInput`Optional + +```typescript +public readonly roleArnInput: string; +``` + +- *Type:* string + +--- + ##### `secretAccessKeyInput`Optional ```typescript @@ -818,6 +856,16 @@ public readonly customTags: {[ key: string ]: string}; --- +##### `externalId`Required + +```typescript +public readonly externalId: string; +``` + +- *Type:* string + +--- + ##### `id`Required ```typescript @@ -858,6 +906,16 @@ public readonly region: string; --- +##### `roleArn`Required + +```typescript +public readonly roleArn: string; +``` + +- *Type:* string + +--- + ##### `secretAccessKey`Required ```typescript @@ -922,9 +980,11 @@ const secretsSyncAwsDestinationConfig: secretsSyncAwsDestination.SecretsSyncAwsD | name | string | Unique name of the AWS destination. | | accessKeyId | string | Access key id to authenticate against the AWS secrets manager. | | customTags | {[ key: string ]: string} | Custom tags to set on the secret managed at the destination. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | +| externalId | string | Extra protection that must match the trust policy granting access to the AWS IAM role ARN. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. | | namespace | string | Target namespace. (requires Enterprise). | | region | string | Region where to manage the secrets manager entries. | +| roleArn | string | Specifies a role to assume when connecting to AWS. | | secretAccessKey | string | Secret access key to authenticate against the AWS secrets manager. | | secretNameTemplate | string | Template describing how to generate external secret names. | @@ -1010,7 +1070,7 @@ public readonly name: string; Unique name of the AWS destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} --- @@ -1024,7 +1084,7 @@ public readonly accessKeyId: string; Access key id to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} --- @@ -1038,7 +1098,21 @@ public readonly customTags: {[ key: string ]: string}; Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} + +--- + +##### `externalId`Optional + +```typescript +public readonly externalId: string; +``` + +- *Type:* string + +Extra protection that must match the trust policy granting access to the AWS IAM role ARN. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#external_id SecretsSyncAwsDestination#external_id} --- @@ -1050,7 +1124,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1067,7 +1141,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} --- @@ -1081,7 +1155,21 @@ public readonly region: string; Region where to manage the secrets manager entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} + +--- + +##### `roleArn`Optional + +```typescript +public readonly roleArn: string; +``` + +- *Type:* string + +Specifies a role to assume when connecting to AWS. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#role_arn SecretsSyncAwsDestination#role_arn} --- @@ -1095,7 +1183,7 @@ public readonly secretAccessKey: string; Secret access key to authenticate against the AWS secrets manager. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} --- @@ -1109,7 +1197,7 @@ public readonly secretNameTemplate: string; Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} --- diff --git a/docs/secretsSyncAzureDestination.csharp.md b/docs/secretsSyncAzureDestination.csharp.md index 1761d666..13d3353e 100644 --- a/docs/secretsSyncAzureDestination.csharp.md +++ b/docs/secretsSyncAzureDestination.csharp.md @@ -4,7 +4,7 @@ ### SecretsSyncAzureDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the SecretsSyncAzureDestinatio The id of the existing SecretsSyncAzureDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use --- @@ -1000,7 +1000,7 @@ new SecretsSyncAzureDestinationConfig { | ClientSecret | string | Client Secret of an Azure app registration. | | Cloud | string | Specifies a cloud for the client. | | CustomTags | System.Collections.Generic.IDictionary | Custom tags to set on the secret managed at the destination. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | | KeyVaultUri | string | URI of an existing Azure Key Vault instance. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretNameTemplate | string | Template describing how to generate external secret names. | @@ -1088,7 +1088,7 @@ public string Name { get; set; } Unique name of the Azure destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} --- @@ -1102,7 +1102,7 @@ public string ClientId { get; set; } Client ID of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} --- @@ -1116,7 +1116,7 @@ public string ClientSecret { get; set; } Client Secret of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} --- @@ -1130,7 +1130,7 @@ public string Cloud { get; set; } Specifies a cloud for the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} --- @@ -1144,7 +1144,7 @@ public System.Collections.Generic.IDictionary CustomTags { get; Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} --- @@ -1156,7 +1156,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1173,7 +1173,7 @@ public string KeyVaultUri { get; set; } URI of an existing Azure Key Vault instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} --- @@ -1187,7 +1187,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} --- @@ -1201,7 +1201,7 @@ public string SecretNameTemplate { get; set; } Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} --- @@ -1215,7 +1215,7 @@ public string TenantId { get; set; } ID of the target Azure tenant. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} --- diff --git a/docs/secretsSyncAzureDestination.go.md b/docs/secretsSyncAzureDestination.go.md index 4171449a..86ca0eb7 100644 --- a/docs/secretsSyncAzureDestination.go.md +++ b/docs/secretsSyncAzureDestination.go.md @@ -4,12 +4,12 @@ ### SecretsSyncAzureDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncazuredestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncazuredestination" secretssyncazuredestination.NewSecretsSyncAzureDestination(scope Construct, id *string, config SecretsSyncAzureDestinationConfig) SecretsSyncAzureDestination ``` @@ -441,7 +441,7 @@ func ResetTenantId() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncazuredestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncazuredestination" secretssyncazuredestination.SecretsSyncAzureDestination_IsConstruct(x interface{}) *bool ``` @@ -473,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncazuredestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncazuredestination" secretssyncazuredestination.SecretsSyncAzureDestination_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +487,7 @@ secretssyncazuredestination.SecretsSyncAzureDestination_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncazuredestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncazuredestination" secretssyncazuredestination.SecretsSyncAzureDestination_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +501,7 @@ secretssyncazuredestination.SecretsSyncAzureDestination_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncazuredestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncazuredestination" secretssyncazuredestination.SecretsSyncAzureDestination_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -530,7 +530,7 @@ The construct id used in the generated config for the SecretsSyncAzureDestinatio The id of the existing SecretsSyncAzureDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use --- @@ -961,7 +961,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncazuredestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncazuredestination" &secretssyncazuredestination.SecretsSyncAzureDestinationConfig { Connection: interface{}, @@ -1000,7 +1000,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncazuredesti | ClientSecret | *string | Client Secret of an Azure app registration. | | Cloud | *string | Specifies a cloud for the client. | | CustomTags | *map[string]*string | Custom tags to set on the secret managed at the destination. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | | KeyVaultUri | *string | URI of an existing Azure Key Vault instance. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretNameTemplate | *string | Template describing how to generate external secret names. | @@ -1088,7 +1088,7 @@ Name *string Unique name of the Azure destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} --- @@ -1102,7 +1102,7 @@ ClientId *string Client ID of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} --- @@ -1116,7 +1116,7 @@ ClientSecret *string Client Secret of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} --- @@ -1130,7 +1130,7 @@ Cloud *string Specifies a cloud for the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} --- @@ -1144,7 +1144,7 @@ CustomTags *map[string]*string Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} --- @@ -1156,7 +1156,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1173,7 +1173,7 @@ KeyVaultUri *string URI of an existing Azure Key Vault instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} --- @@ -1187,7 +1187,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} --- @@ -1201,7 +1201,7 @@ SecretNameTemplate *string Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} --- @@ -1215,7 +1215,7 @@ TenantId *string ID of the target Azure tenant. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} --- diff --git a/docs/secretsSyncAzureDestination.java.md b/docs/secretsSyncAzureDestination.java.md index 22a41695..b8ad8d56 100644 --- a/docs/secretsSyncAzureDestination.java.md +++ b/docs/secretsSyncAzureDestination.java.md @@ -4,7 +4,7 @@ ### SecretsSyncAzureDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. #### Initializers @@ -52,7 +52,7 @@ SecretsSyncAzureDestination.Builder.create(Construct scope, java.lang.String id) | clientSecret | java.lang.String | Client Secret of an Azure app registration. | | cloud | java.lang.String | Specifies a cloud for the client. | | customTags | java.util.Map | Custom tags to set on the secret managed at the destination. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | | keyVaultUri | java.lang.String | URI of an existing Azure Key Vault instance. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretNameTemplate | java.lang.String | Template describing how to generate external secret names. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope Unique name of the Azure destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client ID of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client Secret of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a cloud for the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t URI of an existing Azure Key Vault instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the target Azure tenant. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} --- @@ -707,7 +707,7 @@ The construct id used in the generated config for the SecretsSyncAzureDestinatio The id of the existing SecretsSyncAzureDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use --- @@ -1181,7 +1181,7 @@ SecretsSyncAzureDestinationConfig.builder() | clientSecret | java.lang.String | Client Secret of an Azure app registration. | | cloud | java.lang.String | Specifies a cloud for the client. | | customTags | java.util.Map | Custom tags to set on the secret managed at the destination. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | | keyVaultUri | java.lang.String | URI of an existing Azure Key Vault instance. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretNameTemplate | java.lang.String | Template describing how to generate external secret names. | @@ -1269,7 +1269,7 @@ public java.lang.String getName(); Unique name of the Azure destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} --- @@ -1283,7 +1283,7 @@ public java.lang.String getClientId(); Client ID of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} --- @@ -1297,7 +1297,7 @@ public java.lang.String getClientSecret(); Client Secret of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} --- @@ -1311,7 +1311,7 @@ public java.lang.String getCloud(); Specifies a cloud for the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} --- @@ -1325,7 +1325,7 @@ public java.util.Map getCustomTags(); Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} --- @@ -1337,7 +1337,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1354,7 +1354,7 @@ public java.lang.String getKeyVaultUri(); URI of an existing Azure Key Vault instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} --- @@ -1368,7 +1368,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} --- @@ -1382,7 +1382,7 @@ public java.lang.String getSecretNameTemplate(); Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} --- @@ -1396,7 +1396,7 @@ public java.lang.String getTenantId(); ID of the target Azure tenant. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} --- diff --git a/docs/secretsSyncAzureDestination.python.md b/docs/secretsSyncAzureDestination.python.md index ab043bb7..c3775841 100644 --- a/docs/secretsSyncAzureDestination.python.md +++ b/docs/secretsSyncAzureDestination.python.md @@ -4,7 +4,7 @@ ### SecretsSyncAzureDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. #### Initializers @@ -50,7 +50,7 @@ secretsSyncAzureDestination.SecretsSyncAzureDestination( | client_secret | str | Client Secret of an Azure app registration. | | cloud | str | Specifies a cloud for the client. | | custom_tags | typing.Mapping[str] | Custom tags to set on the secret managed at the destination. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | | key_vault_uri | str | URI of an existing Azure Key Vault instance. | | namespace | str | Target namespace. (requires Enterprise). | | secret_name_template | str | Template describing how to generate external secret names. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope Unique name of the Azure destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client ID of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client Secret of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a cloud for the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -185,7 +185,7 @@ If you experience problems setting this value it might not be settable. Please t URI of an existing Azure Key Vault instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the target Azure tenant. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} --- @@ -751,7 +751,7 @@ The construct id used in the generated config for the SecretsSyncAzureDestinatio The id of the existing SecretsSyncAzureDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use --- @@ -1221,7 +1221,7 @@ secretsSyncAzureDestination.SecretsSyncAzureDestinationConfig( | client_secret | str | Client Secret of an Azure app registration. | | cloud | str | Specifies a cloud for the client. | | custom_tags | typing.Mapping[str] | Custom tags to set on the secret managed at the destination. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | | key_vault_uri | str | URI of an existing Azure Key Vault instance. | | namespace | str | Target namespace. (requires Enterprise). | | secret_name_template | str | Template describing how to generate external secret names. | @@ -1309,7 +1309,7 @@ name: str Unique name of the Azure destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} --- @@ -1323,7 +1323,7 @@ client_id: str Client ID of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} --- @@ -1337,7 +1337,7 @@ client_secret: str Client Secret of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} --- @@ -1351,7 +1351,7 @@ cloud: str Specifies a cloud for the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} --- @@ -1365,7 +1365,7 @@ custom_tags: typing.Mapping[str] Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} --- @@ -1377,7 +1377,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1394,7 +1394,7 @@ key_vault_uri: str URI of an existing Azure Key Vault instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} --- @@ -1408,7 +1408,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} --- @@ -1422,7 +1422,7 @@ secret_name_template: str Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} --- @@ -1436,7 +1436,7 @@ tenant_id: str ID of the target Azure tenant. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} --- diff --git a/docs/secretsSyncAzureDestination.typescript.md b/docs/secretsSyncAzureDestination.typescript.md index 50b0d85d..26530f0f 100644 --- a/docs/secretsSyncAzureDestination.typescript.md +++ b/docs/secretsSyncAzureDestination.typescript.md @@ -4,7 +4,7 @@ ### SecretsSyncAzureDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the SecretsSyncAzureDestinatio The id of the existing SecretsSyncAzureDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use --- @@ -982,7 +982,7 @@ const secretsSyncAzureDestinationConfig: secretsSyncAzureDestination.SecretsSync | clientSecret | string | Client Secret of an Azure app registration. | | cloud | string | Specifies a cloud for the client. | | customTags | {[ key: string ]: string} | Custom tags to set on the secret managed at the destination. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. | | keyVaultUri | string | URI of an existing Azure Key Vault instance. | | namespace | string | Target namespace. (requires Enterprise). | | secretNameTemplate | string | Template describing how to generate external secret names. | @@ -1070,7 +1070,7 @@ public readonly name: string; Unique name of the Azure destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} --- @@ -1084,7 +1084,7 @@ public readonly clientId: string; Client ID of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} --- @@ -1098,7 +1098,7 @@ public readonly clientSecret: string; Client Secret of an Azure app registration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} --- @@ -1112,7 +1112,7 @@ public readonly cloud: string; Specifies a cloud for the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} --- @@ -1126,7 +1126,7 @@ public readonly customTags: {[ key: string ]: string}; Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} --- @@ -1138,7 +1138,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1155,7 +1155,7 @@ public readonly keyVaultUri: string; URI of an existing Azure Key Vault instance. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} --- @@ -1169,7 +1169,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} --- @@ -1183,7 +1183,7 @@ public readonly secretNameTemplate: string; Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} --- @@ -1197,7 +1197,7 @@ public readonly tenantId: string; ID of the target Azure tenant. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} --- diff --git a/docs/secretsSyncConfig.csharp.md b/docs/secretsSyncConfig.csharp.md index a6e27761..4df3f8c3 100644 --- a/docs/secretsSyncConfig.csharp.md +++ b/docs/secretsSyncConfig.csharp.md @@ -4,7 +4,7 @@ ### SecretsSyncConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the SecretsSyncConfig to impor The id of the existing SecretsSyncConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use --- @@ -812,7 +812,7 @@ new SecretsSyncConfigConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Disabled | object | Disables the syncing process between Vault and external destinations. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | QueueCapacity | double | Maximum number of pending sync operations allowed on the queue. | @@ -898,7 +898,7 @@ public object Disabled { get; set; } Disables the syncing process between Vault and external destinations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} --- @@ -910,7 +910,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} --- @@ -941,7 +941,7 @@ public double QueueCapacity { get; set; } Maximum number of pending sync operations allowed on the queue. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} --- diff --git a/docs/secretsSyncConfig.go.md b/docs/secretsSyncConfig.go.md index cdd49a2c..29c79257 100644 --- a/docs/secretsSyncConfig.go.md +++ b/docs/secretsSyncConfig.go.md @@ -4,12 +4,12 @@ ### SecretsSyncConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncconfig" secretssyncconfig.NewSecretsSyncConfig(scope Construct, id *string, config SecretsSyncConfigConfig) SecretsSyncConfig ``` @@ -406,7 +406,7 @@ func ResetQueueCapacity() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncconfig" secretssyncconfig.SecretsSyncConfig_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncconfig" secretssyncconfig.SecretsSyncConfig_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ secretssyncconfig.SecretsSyncConfig_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncconfig" secretssyncconfig.SecretsSyncConfig_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ secretssyncconfig.SecretsSyncConfig_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncconfig" secretssyncconfig.SecretsSyncConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the SecretsSyncConfig to impor The id of the existing SecretsSyncConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use --- @@ -783,7 +783,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncconfig" &secretssyncconfig.SecretsSyncConfigConfig { Connection: interface{}, @@ -812,7 +812,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncconfig" | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Disabled | interface{} | Disables the syncing process between Vault and external destinations. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | QueueCapacity | *f64 | Maximum number of pending sync operations allowed on the queue. | @@ -898,7 +898,7 @@ Disabled interface{} Disables the syncing process between Vault and external destinations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} --- @@ -910,7 +910,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} --- @@ -941,7 +941,7 @@ QueueCapacity *f64 Maximum number of pending sync operations allowed on the queue. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} --- diff --git a/docs/secretsSyncConfig.java.md b/docs/secretsSyncConfig.java.md index 93ad1473..cae22d54 100644 --- a/docs/secretsSyncConfig.java.md +++ b/docs/secretsSyncConfig.java.md @@ -4,7 +4,7 @@ ### SecretsSyncConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. #### Initializers @@ -43,7 +43,7 @@ SecretsSyncConfig.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | disabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables the syncing process between Vault and external destinations. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | queueCapacity | java.lang.Number | Maximum number of pending sync operations allowed on the queue. | @@ -115,7 +115,7 @@ Must be unique amongst siblings in the same scope Disables the syncing process between Vault and external destinations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} --- @@ -123,7 +123,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -136,7 +136,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of pending sync operations allowed on the queue. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} --- @@ -601,7 +601,7 @@ The construct id used in the generated config for the SecretsSyncConfig to impor The id of the existing SecretsSyncConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use --- @@ -923,7 +923,7 @@ SecretsSyncConfigConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | disabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disables the syncing process between Vault and external destinations. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | queueCapacity | java.lang.Number | Maximum number of pending sync operations allowed on the queue. | @@ -1009,7 +1009,7 @@ public java.lang.Object getDisabled(); Disables the syncing process between Vault and external destinations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} --- @@ -1021,7 +1021,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1038,7 +1038,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} --- @@ -1052,7 +1052,7 @@ public java.lang.Number getQueueCapacity(); Maximum number of pending sync operations allowed on the queue. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} --- diff --git a/docs/secretsSyncConfig.python.md b/docs/secretsSyncConfig.python.md index b298f217..022cdd55 100644 --- a/docs/secretsSyncConfig.python.md +++ b/docs/secretsSyncConfig.python.md @@ -4,7 +4,7 @@ ### SecretsSyncConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. #### Initializers @@ -40,7 +40,7 @@ secretsSyncConfig.SecretsSyncConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | disabled | typing.Union[bool, cdktf.IResolvable] | Disables the syncing process between Vault and external destinations. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | | queue_capacity | typing.Union[int, float] | Maximum number of pending sync operations allowed on the queue. | @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Disables the syncing process between Vault and external destinations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of pending sync operations allowed on the queue. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} --- @@ -644,7 +644,7 @@ The construct id used in the generated config for the SecretsSyncConfig to impor The id of the existing SecretsSyncConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use --- @@ -961,7 +961,7 @@ secretsSyncConfig.SecretsSyncConfigConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | disabled | typing.Union[bool, cdktf.IResolvable] | Disables the syncing process between Vault and external destinations. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | | queue_capacity | typing.Union[int, float] | Maximum number of pending sync operations allowed on the queue. | @@ -1047,7 +1047,7 @@ disabled: typing.Union[bool, IResolvable] Disables the syncing process between Vault and external destinations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} --- @@ -1059,7 +1059,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} --- @@ -1090,7 +1090,7 @@ queue_capacity: typing.Union[int, float] Maximum number of pending sync operations allowed on the queue. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} --- diff --git a/docs/secretsSyncConfig.typescript.md b/docs/secretsSyncConfig.typescript.md index 268fcc5d..e5b8a0cf 100644 --- a/docs/secretsSyncConfig.typescript.md +++ b/docs/secretsSyncConfig.typescript.md @@ -4,7 +4,7 @@ ### SecretsSyncConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config vault_secrets_sync_config}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the SecretsSyncConfig to impor The id of the existing SecretsSyncConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use --- @@ -800,7 +800,7 @@ const secretsSyncConfigConfig: secretsSyncConfig.SecretsSyncConfigConfig = { ... | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | disabled | boolean \| cdktf.IResolvable | Disables the syncing process between Vault and external destinations. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. | | namespace | string | Target namespace. (requires Enterprise). | | queueCapacity | number | Maximum number of pending sync operations allowed on the queue. | @@ -886,7 +886,7 @@ public readonly disabled: boolean | IResolvable; Disables the syncing process between Vault and external destinations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} --- @@ -898,7 +898,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} --- @@ -929,7 +929,7 @@ public readonly queueCapacity: number; Maximum number of pending sync operations allowed on the queue. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} --- diff --git a/docs/secretsSyncGcpDestination.csharp.md b/docs/secretsSyncGcpDestination.csharp.md index c6dbdf4d..d3649a43 100644 --- a/docs/secretsSyncGcpDestination.csharp.md +++ b/docs/secretsSyncGcpDestination.csharp.md @@ -4,7 +4,7 @@ ### SecretsSyncGcpDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. #### Initializers @@ -77,6 +77,7 @@ Must be unique amongst siblings in the same scope | ResetCustomTags | *No description.* | | ResetId | *No description.* | | ResetNamespace | *No description.* | +| ResetProjectId | *No description.* | | ResetSecretNameTemplate | *No description.* | --- @@ -393,6 +394,12 @@ private void ResetId() private void ResetNamespace() ``` +##### `ResetProjectId` + +```csharp +private void ResetProjectId() +``` + ##### `ResetSecretNameTemplate` ```csharp @@ -502,7 +509,7 @@ The construct id used in the generated config for the SecretsSyncGcpDestination The id of the existing SecretsSyncGcpDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use --- @@ -538,12 +545,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | IdInput | string | *No description.* | | NameInput | string | *No description.* | | NamespaceInput | string | *No description.* | +| ProjectIdInput | string | *No description.* | | SecretNameTemplateInput | string | *No description.* | | Credentials | string | *No description.* | | CustomTags | System.Collections.Generic.IDictionary | *No description.* | | Id | string | *No description.* | | Name | string | *No description.* | | Namespace | string | *No description.* | +| ProjectId | string | *No description.* | | SecretNameTemplate | string | *No description.* | --- @@ -750,6 +759,16 @@ public string NamespaceInput { get; } --- +##### `ProjectIdInput`Optional + +```csharp +public string ProjectIdInput { get; } +``` + +- *Type:* string + +--- + ##### `SecretNameTemplateInput`Optional ```csharp @@ -810,6 +829,16 @@ public string Namespace { get; } --- +##### `ProjectId`Required + +```csharp +public string ProjectId { get; } +``` + +- *Type:* string + +--- + ##### `SecretNameTemplate`Required ```csharp @@ -860,6 +889,7 @@ new SecretsSyncGcpDestinationConfig { System.Collections.Generic.IDictionary CustomTags = null, string Id = null, string Namespace = null, + string ProjectId = null, string SecretNameTemplate = null }; ``` @@ -878,8 +908,9 @@ new SecretsSyncGcpDestinationConfig { | Name | string | Unique name of the GCP destination. | | Credentials | string | JSON-encoded credentials to use to connect to GCP. | | CustomTags | System.Collections.Generic.IDictionary | Custom tags to set on the secret managed at the destination. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | | Namespace | string | Target namespace. (requires Enterprise). | +| ProjectId | string | The target project to manage secrets in. | | SecretNameTemplate | string | Template describing how to generate external secret names. | --- @@ -964,7 +995,7 @@ public string Name { get; set; } Unique name of the GCP destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} --- @@ -978,7 +1009,7 @@ public string Credentials { get; set; } JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} --- @@ -992,7 +1023,7 @@ public System.Collections.Generic.IDictionary CustomTags { get; Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} --- @@ -1004,7 +1035,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1021,7 +1052,21 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} + +--- + +##### `ProjectId`Optional + +```csharp +public string ProjectId { get; set; } +``` + +- *Type:* string + +The target project to manage secrets in. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#project_id SecretsSyncGcpDestination#project_id} --- @@ -1035,7 +1080,7 @@ public string SecretNameTemplate { get; set; } Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} --- diff --git a/docs/secretsSyncGcpDestination.go.md b/docs/secretsSyncGcpDestination.go.md index cd9f8485..1a5ceae6 100644 --- a/docs/secretsSyncGcpDestination.go.md +++ b/docs/secretsSyncGcpDestination.go.md @@ -4,12 +4,12 @@ ### SecretsSyncGcpDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncgcpdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgcpdestination" secretssyncgcpdestination.NewSecretsSyncGcpDestination(scope Construct, id *string, config SecretsSyncGcpDestinationConfig) SecretsSyncGcpDestination ``` @@ -77,6 +77,7 @@ Must be unique amongst siblings in the same scope | ResetCustomTags | *No description.* | | ResetId | *No description.* | | ResetNamespace | *No description.* | +| ResetProjectId | *No description.* | | ResetSecretNameTemplate | *No description.* | --- @@ -393,6 +394,12 @@ func ResetId() func ResetNamespace() ``` +##### `ResetProjectId` + +```go +func ResetProjectId() +``` + ##### `ResetSecretNameTemplate` ```go @@ -413,7 +420,7 @@ func ResetSecretNameTemplate() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncgcpdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgcpdestination" secretssyncgcpdestination.SecretsSyncGcpDestination_IsConstruct(x interface{}) *bool ``` @@ -445,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncgcpdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgcpdestination" secretssyncgcpdestination.SecretsSyncGcpDestination_IsTerraformElement(x interface{}) *bool ``` @@ -459,7 +466,7 @@ secretssyncgcpdestination.SecretsSyncGcpDestination_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncgcpdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgcpdestination" secretssyncgcpdestination.SecretsSyncGcpDestination_IsTerraformResource(x interface{}) *bool ``` @@ -473,7 +480,7 @@ secretssyncgcpdestination.SecretsSyncGcpDestination_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncgcpdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgcpdestination" secretssyncgcpdestination.SecretsSyncGcpDestination_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -502,7 +509,7 @@ The construct id used in the generated config for the SecretsSyncGcpDestination The id of the existing SecretsSyncGcpDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use --- @@ -538,12 +545,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | IdInput | *string | *No description.* | | NameInput | *string | *No description.* | | NamespaceInput | *string | *No description.* | +| ProjectIdInput | *string | *No description.* | | SecretNameTemplateInput | *string | *No description.* | | Credentials | *string | *No description.* | | CustomTags | *map[string]*string | *No description.* | | Id | *string | *No description.* | | Name | *string | *No description.* | | Namespace | *string | *No description.* | +| ProjectId | *string | *No description.* | | SecretNameTemplate | *string | *No description.* | --- @@ -750,6 +759,16 @@ func NamespaceInput() *string --- +##### `ProjectIdInput`Optional + +```go +func ProjectIdInput() *string +``` + +- *Type:* *string + +--- + ##### `SecretNameTemplateInput`Optional ```go @@ -810,6 +829,16 @@ func Namespace() *string --- +##### `ProjectId`Required + +```go +func ProjectId() *string +``` + +- *Type:* *string + +--- + ##### `SecretNameTemplate`Required ```go @@ -845,7 +874,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncgcpdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgcpdestination" &secretssyncgcpdestination.SecretsSyncGcpDestinationConfig { Connection: interface{}, @@ -860,6 +889,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncgcpdestina CustomTags: *map[string]*string, Id: *string, Namespace: *string, + ProjectId: *string, SecretNameTemplate: *string, } ``` @@ -878,8 +908,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncgcpdestina | Name | *string | Unique name of the GCP destination. | | Credentials | *string | JSON-encoded credentials to use to connect to GCP. | | CustomTags | *map[string]*string | Custom tags to set on the secret managed at the destination. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | +| ProjectId | *string | The target project to manage secrets in. | | SecretNameTemplate | *string | Template describing how to generate external secret names. | --- @@ -964,7 +995,7 @@ Name *string Unique name of the GCP destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} --- @@ -978,7 +1009,7 @@ Credentials *string JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} --- @@ -992,7 +1023,7 @@ CustomTags *map[string]*string Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} --- @@ -1004,7 +1035,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1021,7 +1052,21 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} + +--- + +##### `ProjectId`Optional + +```go +ProjectId *string +``` + +- *Type:* *string + +The target project to manage secrets in. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#project_id SecretsSyncGcpDestination#project_id} --- @@ -1035,7 +1080,7 @@ SecretNameTemplate *string Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} --- diff --git a/docs/secretsSyncGcpDestination.java.md b/docs/secretsSyncGcpDestination.java.md index d9d4916f..db31c515 100644 --- a/docs/secretsSyncGcpDestination.java.md +++ b/docs/secretsSyncGcpDestination.java.md @@ -4,7 +4,7 @@ ### SecretsSyncGcpDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. #### Initializers @@ -28,6 +28,7 @@ SecretsSyncGcpDestination.Builder.create(Construct scope, java.lang.String id) // .customTags(java.util.Map) // .id(java.lang.String) // .namespace(java.lang.String) +// .projectId(java.lang.String) // .secretNameTemplate(java.lang.String) .build(); ``` @@ -46,8 +47,9 @@ SecretsSyncGcpDestination.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Unique name of the GCP destination. | | credentials | java.lang.String | JSON-encoded credentials to use to connect to GCP. | | customTags | java.util.Map | Custom tags to set on the secret managed at the destination. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | +| projectId | java.lang.String | The target project to manage secrets in. | | secretNameTemplate | java.lang.String | Template describing how to generate external secret names. | --- @@ -118,7 +120,7 @@ Must be unique amongst siblings in the same scope Unique name of the GCP destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} --- @@ -128,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} --- @@ -138,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} --- @@ -146,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +161,17 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} + +--- + +##### `projectId`Optional + +- *Type:* java.lang.String + +The target project to manage secrets in. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#project_id SecretsSyncGcpDestination#project_id} --- @@ -169,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} --- @@ -204,6 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetCustomTags | *No description.* | | resetId | *No description.* | | resetNamespace | *No description.* | +| resetProjectId | *No description.* | | resetSecretNameTemplate | *No description.* | --- @@ -522,6 +535,12 @@ public void resetId() public void resetNamespace() ``` +##### `resetProjectId` + +```java +public void resetProjectId() +``` + ##### `resetSecretNameTemplate` ```java @@ -631,7 +650,7 @@ The construct id used in the generated config for the SecretsSyncGcpDestination The id of the existing SecretsSyncGcpDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use --- @@ -667,12 +686,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | idInput | java.lang.String | *No description.* | | nameInput | java.lang.String | *No description.* | | namespaceInput | java.lang.String | *No description.* | +| projectIdInput | java.lang.String | *No description.* | | secretNameTemplateInput | java.lang.String | *No description.* | | credentials | java.lang.String | *No description.* | | customTags | java.util.Map | *No description.* | | id | java.lang.String | *No description.* | | name | java.lang.String | *No description.* | | namespace | java.lang.String | *No description.* | +| projectId | java.lang.String | *No description.* | | secretNameTemplate | java.lang.String | *No description.* | --- @@ -879,6 +900,16 @@ public java.lang.String getNamespaceInput(); --- +##### `projectIdInput`Optional + +```java +public java.lang.String getProjectIdInput(); +``` + +- *Type:* java.lang.String + +--- + ##### `secretNameTemplateInput`Optional ```java @@ -939,6 +970,16 @@ public java.lang.String getNamespace(); --- +##### `projectId`Required + +```java +public java.lang.String getProjectId(); +``` + +- *Type:* java.lang.String + +--- + ##### `secretNameTemplate`Required ```java @@ -993,6 +1034,7 @@ SecretsSyncGcpDestinationConfig.builder() // .customTags(java.util.Map) // .id(java.lang.String) // .namespace(java.lang.String) +// .projectId(java.lang.String) // .secretNameTemplate(java.lang.String) .build(); ``` @@ -1011,8 +1053,9 @@ SecretsSyncGcpDestinationConfig.builder() | name | java.lang.String | Unique name of the GCP destination. | | credentials | java.lang.String | JSON-encoded credentials to use to connect to GCP. | | customTags | java.util.Map | Custom tags to set on the secret managed at the destination. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | +| projectId | java.lang.String | The target project to manage secrets in. | | secretNameTemplate | java.lang.String | Template describing how to generate external secret names. | --- @@ -1097,7 +1140,7 @@ public java.lang.String getName(); Unique name of the GCP destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} --- @@ -1111,7 +1154,7 @@ public java.lang.String getCredentials(); JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} --- @@ -1125,7 +1168,7 @@ public java.util.Map getCustomTags(); Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} --- @@ -1137,7 +1180,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1154,7 +1197,21 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} + +--- + +##### `projectId`Optional + +```java +public java.lang.String getProjectId(); +``` + +- *Type:* java.lang.String + +The target project to manage secrets in. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#project_id SecretsSyncGcpDestination#project_id} --- @@ -1168,7 +1225,7 @@ public java.lang.String getSecretNameTemplate(); Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} --- diff --git a/docs/secretsSyncGcpDestination.python.md b/docs/secretsSyncGcpDestination.python.md index 73afac94..7834f09e 100644 --- a/docs/secretsSyncGcpDestination.python.md +++ b/docs/secretsSyncGcpDestination.python.md @@ -4,7 +4,7 @@ ### SecretsSyncGcpDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. #### Initializers @@ -26,6 +26,7 @@ secretsSyncGcpDestination.SecretsSyncGcpDestination( custom_tags: typing.Mapping[str] = None, id: str = None, namespace: str = None, + project_id: str = None, secret_name_template: str = None ) ``` @@ -44,8 +45,9 @@ secretsSyncGcpDestination.SecretsSyncGcpDestination( | name | str | Unique name of the GCP destination. | | credentials | str | JSON-encoded credentials to use to connect to GCP. | | custom_tags | typing.Mapping[str] | Custom tags to set on the secret managed at the destination. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | | namespace | str | Target namespace. (requires Enterprise). | +| project_id | str | The target project to manage secrets in. | | secret_name_template | str | Template describing how to generate external secret names. | --- @@ -116,7 +118,7 @@ Must be unique amongst siblings in the same scope Unique name of the GCP destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} --- @@ -126,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} --- @@ -136,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} --- @@ -144,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +159,17 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} + +--- + +##### `project_id`Optional + +- *Type:* str + +The target project to manage secrets in. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#project_id SecretsSyncGcpDestination#project_id} --- @@ -167,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} --- @@ -202,6 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_custom_tags | *No description.* | | reset_id | *No description.* | | reset_namespace | *No description.* | +| reset_project_id | *No description.* | | reset_secret_name_template | *No description.* | --- @@ -555,6 +568,12 @@ def reset_id() -> None def reset_namespace() -> None ``` +##### `reset_project_id` + +```python +def reset_project_id() -> None +``` + ##### `reset_secret_name_template` ```python @@ -675,7 +694,7 @@ The construct id used in the generated config for the SecretsSyncGcpDestination The id of the existing SecretsSyncGcpDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use --- @@ -711,12 +730,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | id_input | str | *No description.* | | name_input | str | *No description.* | | namespace_input | str | *No description.* | +| project_id_input | str | *No description.* | | secret_name_template_input | str | *No description.* | | credentials | str | *No description.* | | custom_tags | typing.Mapping[str] | *No description.* | | id | str | *No description.* | | name | str | *No description.* | | namespace | str | *No description.* | +| project_id | str | *No description.* | | secret_name_template | str | *No description.* | --- @@ -923,6 +944,16 @@ namespace_input: str --- +##### `project_id_input`Optional + +```python +project_id_input: str +``` + +- *Type:* str + +--- + ##### `secret_name_template_input`Optional ```python @@ -983,6 +1014,16 @@ namespace: str --- +##### `project_id`Required + +```python +project_id: str +``` + +- *Type:* str + +--- + ##### `secret_name_template`Required ```python @@ -1033,6 +1074,7 @@ secretsSyncGcpDestination.SecretsSyncGcpDestinationConfig( custom_tags: typing.Mapping[str] = None, id: str = None, namespace: str = None, + project_id: str = None, secret_name_template: str = None ) ``` @@ -1051,8 +1093,9 @@ secretsSyncGcpDestination.SecretsSyncGcpDestinationConfig( | name | str | Unique name of the GCP destination. | | credentials | str | JSON-encoded credentials to use to connect to GCP. | | custom_tags | typing.Mapping[str] | Custom tags to set on the secret managed at the destination. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | | namespace | str | Target namespace. (requires Enterprise). | +| project_id | str | The target project to manage secrets in. | | secret_name_template | str | Template describing how to generate external secret names. | --- @@ -1137,7 +1180,7 @@ name: str Unique name of the GCP destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} --- @@ -1151,7 +1194,7 @@ credentials: str JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} --- @@ -1165,7 +1208,7 @@ custom_tags: typing.Mapping[str] Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} --- @@ -1177,7 +1220,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1194,7 +1237,21 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} + +--- + +##### `project_id`Optional + +```python +project_id: str +``` + +- *Type:* str + +The target project to manage secrets in. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#project_id SecretsSyncGcpDestination#project_id} --- @@ -1208,7 +1265,7 @@ secret_name_template: str Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} --- diff --git a/docs/secretsSyncGcpDestination.typescript.md b/docs/secretsSyncGcpDestination.typescript.md index 2cb0571d..87acccff 100644 --- a/docs/secretsSyncGcpDestination.typescript.md +++ b/docs/secretsSyncGcpDestination.typescript.md @@ -4,7 +4,7 @@ ### SecretsSyncGcpDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination}. #### Initializers @@ -77,6 +77,7 @@ Must be unique amongst siblings in the same scope | resetCustomTags | *No description.* | | resetId | *No description.* | | resetNamespace | *No description.* | +| resetProjectId | *No description.* | | resetSecretNameTemplate | *No description.* | --- @@ -393,6 +394,12 @@ public resetId(): void public resetNamespace(): void ``` +##### `resetProjectId` + +```typescript +public resetProjectId(): void +``` + ##### `resetSecretNameTemplate` ```typescript @@ -502,7 +509,7 @@ The construct id used in the generated config for the SecretsSyncGcpDestination The id of the existing SecretsSyncGcpDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use --- @@ -538,12 +545,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | idInput | string | *No description.* | | nameInput | string | *No description.* | | namespaceInput | string | *No description.* | +| projectIdInput | string | *No description.* | | secretNameTemplateInput | string | *No description.* | | credentials | string | *No description.* | | customTags | {[ key: string ]: string} | *No description.* | | id | string | *No description.* | | name | string | *No description.* | | namespace | string | *No description.* | +| projectId | string | *No description.* | | secretNameTemplate | string | *No description.* | --- @@ -750,6 +759,16 @@ public readonly namespaceInput: string; --- +##### `projectIdInput`Optional + +```typescript +public readonly projectIdInput: string; +``` + +- *Type:* string + +--- + ##### `secretNameTemplateInput`Optional ```typescript @@ -810,6 +829,16 @@ public readonly namespace: string; --- +##### `projectId`Required + +```typescript +public readonly projectId: string; +``` + +- *Type:* string + +--- + ##### `secretNameTemplate`Required ```typescript @@ -864,8 +893,9 @@ const secretsSyncGcpDestinationConfig: secretsSyncGcpDestination.SecretsSyncGcpD | name | string | Unique name of the GCP destination. | | credentials | string | JSON-encoded credentials to use to connect to GCP. | | customTags | {[ key: string ]: string} | Custom tags to set on the secret managed at the destination. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. | | namespace | string | Target namespace. (requires Enterprise). | +| projectId | string | The target project to manage secrets in. | | secretNameTemplate | string | Template describing how to generate external secret names. | --- @@ -950,7 +980,7 @@ public readonly name: string; Unique name of the GCP destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} --- @@ -964,7 +994,7 @@ public readonly credentials: string; JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} --- @@ -978,7 +1008,7 @@ public readonly customTags: {[ key: string ]: string}; Custom tags to set on the secret managed at the destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} --- @@ -990,7 +1020,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1007,7 +1037,21 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} + +--- + +##### `projectId`Optional + +```typescript +public readonly projectId: string; +``` + +- *Type:* string + +The target project to manage secrets in. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#project_id SecretsSyncGcpDestination#project_id} --- @@ -1021,7 +1065,7 @@ public readonly secretNameTemplate: string; Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} --- diff --git a/docs/secretsSyncGhDestination.csharp.md b/docs/secretsSyncGhDestination.csharp.md index 6cbbfdef..8c065352 100644 --- a/docs/secretsSyncGhDestination.csharp.md +++ b/docs/secretsSyncGhDestination.csharp.md @@ -4,7 +4,7 @@ ### SecretsSyncGhDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. #### Initializers @@ -74,7 +74,9 @@ Must be unique amongst siblings in the same scope | MoveTo | Moves this resource to the target resource given by moveTarget. | | MoveToId | Moves this resource to the resource corresponding to "id". | | ResetAccessToken | *No description.* | +| ResetAppName | *No description.* | | ResetId | *No description.* | +| ResetInstallationId | *No description.* | | ResetNamespace | *No description.* | | ResetRepositoryName | *No description.* | | ResetRepositoryOwner | *No description.* | @@ -376,12 +378,24 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". private void ResetAccessToken() ``` +##### `ResetAppName` + +```csharp +private void ResetAppName() +``` + ##### `ResetId` ```csharp private void ResetId() ``` +##### `ResetInstallationId` + +```csharp +private void ResetInstallationId() +``` + ##### `ResetNamespace` ```csharp @@ -509,7 +523,7 @@ The construct id used in the generated config for the SecretsSyncGhDestination t The id of the existing SecretsSyncGhDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use --- @@ -541,14 +555,18 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Provisioners | object[] | *No description.* | | Type | string | *No description.* | | AccessTokenInput | string | *No description.* | +| AppNameInput | string | *No description.* | | IdInput | string | *No description.* | +| InstallationIdInput | double | *No description.* | | NameInput | string | *No description.* | | NamespaceInput | string | *No description.* | | RepositoryNameInput | string | *No description.* | | RepositoryOwnerInput | string | *No description.* | | SecretNameTemplateInput | string | *No description.* | | AccessToken | string | *No description.* | +| AppName | string | *No description.* | | Id | string | *No description.* | +| InstallationId | double | *No description.* | | Name | string | *No description.* | | Namespace | string | *No description.* | | RepositoryName | string | *No description.* | @@ -719,6 +737,16 @@ public string AccessTokenInput { get; } --- +##### `AppNameInput`Optional + +```csharp +public string AppNameInput { get; } +``` + +- *Type:* string + +--- + ##### `IdInput`Optional ```csharp @@ -729,6 +757,16 @@ public string IdInput { get; } --- +##### `InstallationIdInput`Optional + +```csharp +public double InstallationIdInput { get; } +``` + +- *Type:* double + +--- + ##### `NameInput`Optional ```csharp @@ -789,6 +827,16 @@ public string AccessToken { get; } --- +##### `AppName`Required + +```csharp +public string AppName { get; } +``` + +- *Type:* string + +--- + ##### `Id`Required ```csharp @@ -799,6 +847,16 @@ public string Id { get; } --- +##### `InstallationId`Required + +```csharp +public double InstallationId { get; } +``` + +- *Type:* double + +--- + ##### `Name`Required ```csharp @@ -886,7 +944,9 @@ new SecretsSyncGhDestinationConfig { object[] Provisioners = null, string Name, string AccessToken = null, + string AppName = null, string Id = null, + double InstallationId = null, string Namespace = null, string RepositoryName = null, string RepositoryOwner = null, @@ -907,7 +967,9 @@ new SecretsSyncGhDestinationConfig { | Provisioners | object[] | *No description.* | | Name | string | Unique name of the github destination. | | AccessToken | string | Fine-grained or personal access token. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| AppName | string | The user-defined name of the GitHub App configuration. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| InstallationId | double | The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. | | Namespace | string | Target namespace. (requires Enterprise). | | RepositoryName | string | Name of the repository. | | RepositoryOwner | string | GitHub organization or username that owns the repository. | @@ -995,7 +1057,7 @@ public string Name { get; set; } Unique name of the github destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} --- @@ -1009,7 +1071,21 @@ public string AccessToken { get; set; } Fine-grained or personal access token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} + +--- + +##### `AppName`Optional + +```csharp +public string AppName { get; set; } +``` + +- *Type:* string + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#app_name SecretsSyncGhDestination#app_name} --- @@ -1021,13 +1097,29 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. --- +##### `InstallationId`Optional + +```csharp +public double InstallationId { get; set; } +``` + +- *Type:* double + +The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. + +Necessary if the app_name field is also provided. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#installation_id SecretsSyncGhDestination#installation_id} + +--- + ##### `Namespace`Optional ```csharp @@ -1038,7 +1130,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} --- @@ -1052,7 +1144,7 @@ public string RepositoryName { get; set; } Name of the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} --- @@ -1066,7 +1158,7 @@ public string RepositoryOwner { get; set; } GitHub organization or username that owns the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} --- @@ -1080,7 +1172,7 @@ public string SecretNameTemplate { get; set; } Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} --- diff --git a/docs/secretsSyncGhDestination.go.md b/docs/secretsSyncGhDestination.go.md index 21954b21..540743c6 100644 --- a/docs/secretsSyncGhDestination.go.md +++ b/docs/secretsSyncGhDestination.go.md @@ -4,12 +4,12 @@ ### SecretsSyncGhDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncghdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncghdestination" secretssyncghdestination.NewSecretsSyncGhDestination(scope Construct, id *string, config SecretsSyncGhDestinationConfig) SecretsSyncGhDestination ``` @@ -74,7 +74,9 @@ Must be unique amongst siblings in the same scope | MoveTo | Moves this resource to the target resource given by moveTarget. | | MoveToId | Moves this resource to the resource corresponding to "id". | | ResetAccessToken | *No description.* | +| ResetAppName | *No description.* | | ResetId | *No description.* | +| ResetInstallationId | *No description.* | | ResetNamespace | *No description.* | | ResetRepositoryName | *No description.* | | ResetRepositoryOwner | *No description.* | @@ -376,12 +378,24 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". func ResetAccessToken() ``` +##### `ResetAppName` + +```go +func ResetAppName() +``` + ##### `ResetId` ```go func ResetId() ``` +##### `ResetInstallationId` + +```go +func ResetInstallationId() +``` + ##### `ResetNamespace` ```go @@ -420,7 +434,7 @@ func ResetSecretNameTemplate() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncghdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncghdestination" secretssyncghdestination.SecretsSyncGhDestination_IsConstruct(x interface{}) *bool ``` @@ -452,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncghdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncghdestination" secretssyncghdestination.SecretsSyncGhDestination_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +480,7 @@ secretssyncghdestination.SecretsSyncGhDestination_IsTerraformElement(x interface ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncghdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncghdestination" secretssyncghdestination.SecretsSyncGhDestination_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +494,7 @@ secretssyncghdestination.SecretsSyncGhDestination_IsTerraformResource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncghdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncghdestination" secretssyncghdestination.SecretsSyncGhDestination_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +523,7 @@ The construct id used in the generated config for the SecretsSyncGhDestination t The id of the existing SecretsSyncGhDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use --- @@ -541,14 +555,18 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | Provisioners | *[]interface{} | *No description.* | | Type | *string | *No description.* | | AccessTokenInput | *string | *No description.* | +| AppNameInput | *string | *No description.* | | IdInput | *string | *No description.* | +| InstallationIdInput | *f64 | *No description.* | | NameInput | *string | *No description.* | | NamespaceInput | *string | *No description.* | | RepositoryNameInput | *string | *No description.* | | RepositoryOwnerInput | *string | *No description.* | | SecretNameTemplateInput | *string | *No description.* | | AccessToken | *string | *No description.* | +| AppName | *string | *No description.* | | Id | *string | *No description.* | +| InstallationId | *f64 | *No description.* | | Name | *string | *No description.* | | Namespace | *string | *No description.* | | RepositoryName | *string | *No description.* | @@ -719,6 +737,16 @@ func AccessTokenInput() *string --- +##### `AppNameInput`Optional + +```go +func AppNameInput() *string +``` + +- *Type:* *string + +--- + ##### `IdInput`Optional ```go @@ -729,6 +757,16 @@ func IdInput() *string --- +##### `InstallationIdInput`Optional + +```go +func InstallationIdInput() *f64 +``` + +- *Type:* *f64 + +--- + ##### `NameInput`Optional ```go @@ -789,6 +827,16 @@ func AccessToken() *string --- +##### `AppName`Required + +```go +func AppName() *string +``` + +- *Type:* *string + +--- + ##### `Id`Required ```go @@ -799,6 +847,16 @@ func Id() *string --- +##### `InstallationId`Required + +```go +func InstallationId() *f64 +``` + +- *Type:* *f64 + +--- + ##### `Name`Required ```go @@ -874,7 +932,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncghdestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncghdestination" &secretssyncghdestination.SecretsSyncGhDestinationConfig { Connection: interface{}, @@ -886,7 +944,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncghdestinat Provisioners: *[]interface{}, Name: *string, AccessToken: *string, + AppName: *string, Id: *string, + InstallationId: *f64, Namespace: *string, RepositoryName: *string, RepositoryOwner: *string, @@ -907,7 +967,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncghdestinat | Provisioners | *[]interface{} | *No description.* | | Name | *string | Unique name of the github destination. | | AccessToken | *string | Fine-grained or personal access token. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| AppName | *string | The user-defined name of the GitHub App configuration. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| InstallationId | *f64 | The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. | | Namespace | *string | Target namespace. (requires Enterprise). | | RepositoryName | *string | Name of the repository. | | RepositoryOwner | *string | GitHub organization or username that owns the repository. | @@ -995,7 +1057,7 @@ Name *string Unique name of the github destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} --- @@ -1009,7 +1071,21 @@ AccessToken *string Fine-grained or personal access token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} + +--- + +##### `AppName`Optional + +```go +AppName *string +``` + +- *Type:* *string + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#app_name SecretsSyncGhDestination#app_name} --- @@ -1021,13 +1097,29 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. --- +##### `InstallationId`Optional + +```go +InstallationId *f64 +``` + +- *Type:* *f64 + +The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. + +Necessary if the app_name field is also provided. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#installation_id SecretsSyncGhDestination#installation_id} + +--- + ##### `Namespace`Optional ```go @@ -1038,7 +1130,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} --- @@ -1052,7 +1144,7 @@ RepositoryName *string Name of the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} --- @@ -1066,7 +1158,7 @@ RepositoryOwner *string GitHub organization or username that owns the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} --- @@ -1080,7 +1172,7 @@ SecretNameTemplate *string Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} --- diff --git a/docs/secretsSyncGhDestination.java.md b/docs/secretsSyncGhDestination.java.md index 928c6e9c..c55e9f86 100644 --- a/docs/secretsSyncGhDestination.java.md +++ b/docs/secretsSyncGhDestination.java.md @@ -4,7 +4,7 @@ ### SecretsSyncGhDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. #### Initializers @@ -25,7 +25,9 @@ SecretsSyncGhDestination.Builder.create(Construct scope, java.lang.String id) // .provisioners(RemoteExecProvisioner>) .name(java.lang.String) // .accessToken(java.lang.String) +// .appName(java.lang.String) // .id(java.lang.String) +// .installationId(java.lang.Number) // .namespace(java.lang.String) // .repositoryName(java.lang.String) // .repositoryOwner(java.lang.String) @@ -46,7 +48,9 @@ SecretsSyncGhDestination.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | Unique name of the github destination. | | accessToken | java.lang.String | Fine-grained or personal access token. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| appName | java.lang.String | The user-defined name of the GitHub App configuration. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| installationId | java.lang.Number | The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | repositoryName | java.lang.String | Name of the repository. | | repositoryOwner | java.lang.String | GitHub organization or username that owns the repository. | @@ -120,7 +124,7 @@ Must be unique amongst siblings in the same scope Unique name of the github destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} --- @@ -130,7 +134,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Fine-grained or personal access token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} + +--- + +##### `appName`Optional + +- *Type:* java.lang.String + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#app_name SecretsSyncGhDestination#app_name} --- @@ -138,20 +152,32 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. --- +##### `installationId`Optional + +- *Type:* java.lang.Number + +The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. + +Necessary if the app_name field is also provided. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#installation_id SecretsSyncGhDestination#installation_id} + +--- + ##### `namespace`Optional - *Type:* java.lang.String Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} --- @@ -161,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} --- @@ -171,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi GitHub organization or username that owns the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} --- @@ -181,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} --- @@ -213,7 +239,9 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | moveTo | Moves this resource to the target resource given by moveTarget. | | moveToId | Moves this resource to the resource corresponding to "id". | | resetAccessToken | *No description.* | +| resetAppName | *No description.* | | resetId | *No description.* | +| resetInstallationId | *No description.* | | resetNamespace | *No description.* | | resetRepositoryName | *No description.* | | resetRepositoryOwner | *No description.* | @@ -517,12 +545,24 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". public void resetAccessToken() ``` +##### `resetAppName` + +```java +public void resetAppName() +``` + ##### `resetId` ```java public void resetId() ``` +##### `resetInstallationId` + +```java +public void resetInstallationId() +``` + ##### `resetNamespace` ```java @@ -650,7 +690,7 @@ The construct id used in the generated config for the SecretsSyncGhDestination t The id of the existing SecretsSyncGhDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use --- @@ -682,14 +722,18 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | provisioners | java.util.List | *No description.* | | type | java.lang.String | *No description.* | | accessTokenInput | java.lang.String | *No description.* | +| appNameInput | java.lang.String | *No description.* | | idInput | java.lang.String | *No description.* | +| installationIdInput | java.lang.Number | *No description.* | | nameInput | java.lang.String | *No description.* | | namespaceInput | java.lang.String | *No description.* | | repositoryNameInput | java.lang.String | *No description.* | | repositoryOwnerInput | java.lang.String | *No description.* | | secretNameTemplateInput | java.lang.String | *No description.* | | accessToken | java.lang.String | *No description.* | +| appName | java.lang.String | *No description.* | | id | java.lang.String | *No description.* | +| installationId | java.lang.Number | *No description.* | | name | java.lang.String | *No description.* | | namespace | java.lang.String | *No description.* | | repositoryName | java.lang.String | *No description.* | @@ -860,6 +904,16 @@ public java.lang.String getAccessTokenInput(); --- +##### `appNameInput`Optional + +```java +public java.lang.String getAppNameInput(); +``` + +- *Type:* java.lang.String + +--- + ##### `idInput`Optional ```java @@ -870,6 +924,16 @@ public java.lang.String getIdInput(); --- +##### `installationIdInput`Optional + +```java +public java.lang.Number getInstallationIdInput(); +``` + +- *Type:* java.lang.Number + +--- + ##### `nameInput`Optional ```java @@ -930,6 +994,16 @@ public java.lang.String getAccessToken(); --- +##### `appName`Required + +```java +public java.lang.String getAppName(); +``` + +- *Type:* java.lang.String + +--- + ##### `id`Required ```java @@ -940,6 +1014,16 @@ public java.lang.String getId(); --- +##### `installationId`Required + +```java +public java.lang.Number getInstallationId(); +``` + +- *Type:* java.lang.Number + +--- + ##### `name`Required ```java @@ -1031,7 +1115,9 @@ SecretsSyncGhDestinationConfig.builder() // .provisioners(RemoteExecProvisioner>) .name(java.lang.String) // .accessToken(java.lang.String) +// .appName(java.lang.String) // .id(java.lang.String) +// .installationId(java.lang.Number) // .namespace(java.lang.String) // .repositoryName(java.lang.String) // .repositoryOwner(java.lang.String) @@ -1052,7 +1138,9 @@ SecretsSyncGhDestinationConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | Unique name of the github destination. | | accessToken | java.lang.String | Fine-grained or personal access token. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| appName | java.lang.String | The user-defined name of the GitHub App configuration. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| installationId | java.lang.Number | The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | repositoryName | java.lang.String | Name of the repository. | | repositoryOwner | java.lang.String | GitHub organization or username that owns the repository. | @@ -1140,7 +1228,7 @@ public java.lang.String getName(); Unique name of the github destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} --- @@ -1154,7 +1242,21 @@ public java.lang.String getAccessToken(); Fine-grained or personal access token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} + +--- + +##### `appName`Optional + +```java +public java.lang.String getAppName(); +``` + +- *Type:* java.lang.String + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#app_name SecretsSyncGhDestination#app_name} --- @@ -1166,13 +1268,29 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. --- +##### `installationId`Optional + +```java +public java.lang.Number getInstallationId(); +``` + +- *Type:* java.lang.Number + +The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. + +Necessary if the app_name field is also provided. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#installation_id SecretsSyncGhDestination#installation_id} + +--- + ##### `namespace`Optional ```java @@ -1183,7 +1301,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} --- @@ -1197,7 +1315,7 @@ public java.lang.String getRepositoryName(); Name of the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} --- @@ -1211,7 +1329,7 @@ public java.lang.String getRepositoryOwner(); GitHub organization or username that owns the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} --- @@ -1225,7 +1343,7 @@ public java.lang.String getSecretNameTemplate(); Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} --- diff --git a/docs/secretsSyncGhDestination.python.md b/docs/secretsSyncGhDestination.python.md index 4ac094de..dd4afd3a 100644 --- a/docs/secretsSyncGhDestination.python.md +++ b/docs/secretsSyncGhDestination.python.md @@ -4,7 +4,7 @@ ### SecretsSyncGhDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. #### Initializers @@ -23,7 +23,9 @@ secretsSyncGhDestination.SecretsSyncGhDestination( provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, name: str, access_token: str = None, + app_name: str = None, id: str = None, + installation_id: typing.Union[int, float] = None, namespace: str = None, repository_name: str = None, repository_owner: str = None, @@ -44,7 +46,9 @@ secretsSyncGhDestination.SecretsSyncGhDestination( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | Unique name of the github destination. | | access_token | str | Fine-grained or personal access token. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| app_name | str | The user-defined name of the GitHub App configuration. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| installation_id | typing.Union[int, float] | The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. | | namespace | str | Target namespace. (requires Enterprise). | | repository_name | str | Name of the repository. | | repository_owner | str | GitHub organization or username that owns the repository. | @@ -118,7 +122,7 @@ Must be unique amongst siblings in the same scope Unique name of the github destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} --- @@ -128,7 +132,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Fine-grained or personal access token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} + +--- + +##### `app_name`Optional + +- *Type:* str + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#app_name SecretsSyncGhDestination#app_name} --- @@ -136,20 +150,32 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. --- +##### `installation_id`Optional + +- *Type:* typing.Union[int, float] + +The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. + +Necessary if the app_name field is also provided. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#installation_id SecretsSyncGhDestination#installation_id} + +--- + ##### `namespace`Optional - *Type:* str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} --- @@ -159,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} --- @@ -169,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi GitHub organization or username that owns the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} --- @@ -179,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} --- @@ -211,7 +237,9 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | move_to | Moves this resource to the target resource given by moveTarget. | | move_to_id | Moves this resource to the resource corresponding to "id". | | reset_access_token | *No description.* | +| reset_app_name | *No description.* | | reset_id | *No description.* | +| reset_installation_id | *No description.* | | reset_namespace | *No description.* | | reset_repository_name | *No description.* | | reset_repository_owner | *No description.* | @@ -550,12 +578,24 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". def reset_access_token() -> None ``` +##### `reset_app_name` + +```python +def reset_app_name() -> None +``` + ##### `reset_id` ```python def reset_id() -> None ``` +##### `reset_installation_id` + +```python +def reset_installation_id() -> None +``` + ##### `reset_namespace` ```python @@ -694,7 +734,7 @@ The construct id used in the generated config for the SecretsSyncGhDestination t The id of the existing SecretsSyncGhDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use --- @@ -726,14 +766,18 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | type | str | *No description.* | | access_token_input | str | *No description.* | +| app_name_input | str | *No description.* | | id_input | str | *No description.* | +| installation_id_input | typing.Union[int, float] | *No description.* | | name_input | str | *No description.* | | namespace_input | str | *No description.* | | repository_name_input | str | *No description.* | | repository_owner_input | str | *No description.* | | secret_name_template_input | str | *No description.* | | access_token | str | *No description.* | +| app_name | str | *No description.* | | id | str | *No description.* | +| installation_id | typing.Union[int, float] | *No description.* | | name | str | *No description.* | | namespace | str | *No description.* | | repository_name | str | *No description.* | @@ -904,6 +948,16 @@ access_token_input: str --- +##### `app_name_input`Optional + +```python +app_name_input: str +``` + +- *Type:* str + +--- + ##### `id_input`Optional ```python @@ -914,6 +968,16 @@ id_input: str --- +##### `installation_id_input`Optional + +```python +installation_id_input: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + ##### `name_input`Optional ```python @@ -974,6 +1038,16 @@ access_token: str --- +##### `app_name`Required + +```python +app_name: str +``` + +- *Type:* str + +--- + ##### `id`Required ```python @@ -984,6 +1058,16 @@ id: str --- +##### `installation_id`Required + +```python +installation_id: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + ##### `name`Required ```python @@ -1071,7 +1155,9 @@ secretsSyncGhDestination.SecretsSyncGhDestinationConfig( provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, name: str, access_token: str = None, + app_name: str = None, id: str = None, + installation_id: typing.Union[int, float] = None, namespace: str = None, repository_name: str = None, repository_owner: str = None, @@ -1092,7 +1178,9 @@ secretsSyncGhDestination.SecretsSyncGhDestinationConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | Unique name of the github destination. | | access_token | str | Fine-grained or personal access token. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| app_name | str | The user-defined name of the GitHub App configuration. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| installation_id | typing.Union[int, float] | The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. | | namespace | str | Target namespace. (requires Enterprise). | | repository_name | str | Name of the repository. | | repository_owner | str | GitHub organization or username that owns the repository. | @@ -1180,7 +1268,7 @@ name: str Unique name of the github destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} --- @@ -1194,7 +1282,21 @@ access_token: str Fine-grained or personal access token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} + +--- + +##### `app_name`Optional + +```python +app_name: str +``` + +- *Type:* str + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#app_name SecretsSyncGhDestination#app_name} --- @@ -1206,13 +1308,29 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. --- +##### `installation_id`Optional + +```python +installation_id: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. + +Necessary if the app_name field is also provided. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#installation_id SecretsSyncGhDestination#installation_id} + +--- + ##### `namespace`Optional ```python @@ -1223,7 +1341,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} --- @@ -1237,7 +1355,7 @@ repository_name: str Name of the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} --- @@ -1251,7 +1369,7 @@ repository_owner: str GitHub organization or username that owns the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} --- @@ -1265,7 +1383,7 @@ secret_name_template: str Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} --- diff --git a/docs/secretsSyncGhDestination.typescript.md b/docs/secretsSyncGhDestination.typescript.md index 3552987e..a6ede87d 100644 --- a/docs/secretsSyncGhDestination.typescript.md +++ b/docs/secretsSyncGhDestination.typescript.md @@ -4,7 +4,7 @@ ### SecretsSyncGhDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination}. #### Initializers @@ -74,7 +74,9 @@ Must be unique amongst siblings in the same scope | moveTo | Moves this resource to the target resource given by moveTarget. | | moveToId | Moves this resource to the resource corresponding to "id". | | resetAccessToken | *No description.* | +| resetAppName | *No description.* | | resetId | *No description.* | +| resetInstallationId | *No description.* | | resetNamespace | *No description.* | | resetRepositoryName | *No description.* | | resetRepositoryOwner | *No description.* | @@ -376,12 +378,24 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". public resetAccessToken(): void ``` +##### `resetAppName` + +```typescript +public resetAppName(): void +``` + ##### `resetId` ```typescript public resetId(): void ``` +##### `resetInstallationId` + +```typescript +public resetInstallationId(): void +``` + ##### `resetNamespace` ```typescript @@ -509,7 +523,7 @@ The construct id used in the generated config for the SecretsSyncGhDestination t The id of the existing SecretsSyncGhDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use --- @@ -541,14 +555,18 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | type | string | *No description.* | | accessTokenInput | string | *No description.* | +| appNameInput | string | *No description.* | | idInput | string | *No description.* | +| installationIdInput | number | *No description.* | | nameInput | string | *No description.* | | namespaceInput | string | *No description.* | | repositoryNameInput | string | *No description.* | | repositoryOwnerInput | string | *No description.* | | secretNameTemplateInput | string | *No description.* | | accessToken | string | *No description.* | +| appName | string | *No description.* | | id | string | *No description.* | +| installationId | number | *No description.* | | name | string | *No description.* | | namespace | string | *No description.* | | repositoryName | string | *No description.* | @@ -719,6 +737,16 @@ public readonly accessTokenInput: string; --- +##### `appNameInput`Optional + +```typescript +public readonly appNameInput: string; +``` + +- *Type:* string + +--- + ##### `idInput`Optional ```typescript @@ -729,6 +757,16 @@ public readonly idInput: string; --- +##### `installationIdInput`Optional + +```typescript +public readonly installationIdInput: number; +``` + +- *Type:* number + +--- + ##### `nameInput`Optional ```typescript @@ -789,6 +827,16 @@ public readonly accessToken: string; --- +##### `appName`Required + +```typescript +public readonly appName: string; +``` + +- *Type:* string + +--- + ##### `id`Required ```typescript @@ -799,6 +847,16 @@ public readonly id: string; --- +##### `installationId`Required + +```typescript +public readonly installationId: number; +``` + +- *Type:* number + +--- + ##### `name`Required ```typescript @@ -892,7 +950,9 @@ const secretsSyncGhDestinationConfig: secretsSyncGhDestination.SecretsSyncGhDest | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | Unique name of the github destination. | | accessToken | string | Fine-grained or personal access token. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| appName | string | The user-defined name of the GitHub App configuration. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. | +| installationId | number | The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. | | namespace | string | Target namespace. (requires Enterprise). | | repositoryName | string | Name of the repository. | | repositoryOwner | string | GitHub organization or username that owns the repository. | @@ -980,7 +1040,7 @@ public readonly name: string; Unique name of the github destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} --- @@ -994,7 +1054,21 @@ public readonly accessToken: string; Fine-grained or personal access token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} + +--- + +##### `appName`Optional + +```typescript +public readonly appName: string; +``` + +- *Type:* string + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#app_name SecretsSyncGhDestination#app_name} --- @@ -1006,13 +1080,29 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. --- +##### `installationId`Optional + +```typescript +public readonly installationId: number; +``` + +- *Type:* number + +The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. + +Necessary if the app_name field is also provided. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#installation_id SecretsSyncGhDestination#installation_id} + +--- + ##### `namespace`Optional ```typescript @@ -1023,7 +1113,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} --- @@ -1037,7 +1127,7 @@ public readonly repositoryName: string; Name of the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} --- @@ -1051,7 +1141,7 @@ public readonly repositoryOwner: string; GitHub organization or username that owns the repository. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} --- @@ -1065,7 +1155,7 @@ public readonly secretNameTemplate: string; Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} --- diff --git a/docs/secretsSyncGithubApps.csharp.md b/docs/secretsSyncGithubApps.csharp.md new file mode 100644 index 00000000..08541c65 --- /dev/null +++ b/docs/secretsSyncGithubApps.csharp.md @@ -0,0 +1,984 @@ +# `secretsSyncGithubApps` Submodule + +## Constructs + +### SecretsSyncGithubApps + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps vault_secrets_sync_github_apps}. + +#### Initializers + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +new SecretsSyncGithubApps(Construct Scope, string Id, SecretsSyncGithubAppsConfig Config); +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Scope | Constructs.Construct | The scope in which to define this construct. | +| Id | string | The scoped construct ID. | +| Config | SecretsSyncGithubAppsConfig | *No description.* | + +--- + +##### `Scope`Required + +- *Type:* Constructs.Construct + +The scope in which to define this construct. + +--- + +##### `Id`Required + +- *Type:* string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `Config`Required + +- *Type:* SecretsSyncGithubAppsConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| ToString | Returns a string representation of this construct. | +| AddOverride | *No description.* | +| OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | +| ToMetadata | *No description.* | +| ToTerraform | Adds this resource to the terraform JSON output. | +| AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| GetAnyMapAttribute | *No description.* | +| GetBooleanAttribute | *No description.* | +| GetBooleanMapAttribute | *No description.* | +| GetListAttribute | *No description.* | +| GetNumberAttribute | *No description.* | +| GetNumberListAttribute | *No description.* | +| GetNumberMapAttribute | *No description.* | +| GetStringAttribute | *No description.* | +| GetStringMapAttribute | *No description.* | +| HasResourceMove | *No description.* | +| ImportFrom | *No description.* | +| InterpolationForAttribute | *No description.* | +| MoveFromId | Move the resource corresponding to "id" to this resource. | +| MoveTo | Moves this resource to the target resource given by moveTarget. | +| MoveToId | Moves this resource to the resource corresponding to "id". | +| ResetId | *No description.* | +| ResetNamespace | *No description.* | + +--- + +##### `ToString` + +```csharp +private string ToString() +``` + +Returns a string representation of this construct. + +##### `AddOverride` + +```csharp +private void AddOverride(string Path, object Value) +``` + +###### `Path`Required + +- *Type:* string + +--- + +###### `Value`Required + +- *Type:* object + +--- + +##### `OverrideLogicalId` + +```csharp +private void OverrideLogicalId(string NewLogicalId) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `NewLogicalId`Required + +- *Type:* string + +The new logical ID to use for this stack element. + +--- + +##### `ResetOverrideLogicalId` + +```csharp +private void ResetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `ToHclTerraform` + +```csharp +private object ToHclTerraform() +``` + +##### `ToMetadata` + +```csharp +private object ToMetadata() +``` + +##### `ToTerraform` + +```csharp +private object ToTerraform() +``` + +Adds this resource to the terraform JSON output. + +##### `AddMoveTarget` + +```csharp +private void AddMoveTarget(string MoveTarget) +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `MoveTarget`Required + +- *Type:* string + +The string move target that will correspond to this resource. + +--- + +##### `GetAnyMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetAnyMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetBooleanAttribute` + +```csharp +private IResolvable GetBooleanAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetBooleanMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetBooleanMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetListAttribute` + +```csharp +private string[] GetListAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberAttribute` + +```csharp +private double GetNumberAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberListAttribute` + +```csharp +private double[] GetNumberListAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetNumberMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetNumberMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetStringAttribute` + +```csharp +private string GetStringAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `GetStringMapAttribute` + +```csharp +private System.Collections.Generic.IDictionary GetStringMapAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `HasResourceMove` + +```csharp +private object HasResourceMove() +``` + +##### `ImportFrom` + +```csharp +private void ImportFrom(string Id, TerraformProvider Provider = null) +``` + +###### `Id`Required + +- *Type:* string + +--- + +###### `Provider`Optional + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `InterpolationForAttribute` + +```csharp +private IResolvable InterpolationForAttribute(string TerraformAttribute) +``` + +###### `TerraformAttribute`Required + +- *Type:* string + +--- + +##### `MoveFromId` + +```csharp +private void MoveFromId(string Id) +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `Id`Required + +- *Type:* string + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `MoveTo` + +```csharp +private void MoveTo(string MoveTarget, object Index = null) +``` + +Moves this resource to the target resource given by moveTarget. + +###### `MoveTarget`Required + +- *Type:* string + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `Index`Optional + +- *Type:* object + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `MoveToId` + +```csharp +private void MoveToId(string Id) +``` + +Moves this resource to the resource corresponding to "id". + +###### `Id`Required + +- *Type:* string + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `ResetId` + +```csharp +private void ResetId() +``` + +##### `ResetNamespace` + +```csharp +private void ResetNamespace() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| IsConstruct | Checks if `x` is a construct. | +| IsTerraformElement | *No description.* | +| IsTerraformResource | *No description.* | +| GenerateConfigForImport | Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". | + +--- + +##### `IsConstruct` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +SecretsSyncGithubApps.IsConstruct(object X); +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `X`Required + +- *Type:* object + +Any object. + +--- + +##### `IsTerraformElement` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +SecretsSyncGithubApps.IsTerraformElement(object X); +``` + +###### `X`Required + +- *Type:* object + +--- + +##### `IsTerraformResource` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +SecretsSyncGithubApps.IsTerraformResource(object X); +``` + +###### `X`Required + +- *Type:* object + +--- + +##### `GenerateConfigForImport` + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +SecretsSyncGithubApps.GenerateConfigForImport(Construct Scope, string ImportToId, string ImportFromId, TerraformProvider Provider = null); +``` + +Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". + +###### `Scope`Required + +- *Type:* Constructs.Construct + +The scope in which to define this construct. + +--- + +###### `ImportToId`Required + +- *Type:* string + +The construct id used in the generated config for the SecretsSyncGithubApps to import. + +--- + +###### `ImportFromId`Required + +- *Type:* string + +The id of the existing SecretsSyncGithubApps that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#import import section} in the documentation of this resource for the id to use + +--- + +###### `Provider`Optional + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +? Optional instance of the provider where the SecretsSyncGithubApps to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Node | Constructs.Node | The tree node. | +| CdktfStack | HashiCorp.Cdktf.TerraformStack | *No description.* | +| Fqn | string | *No description.* | +| FriendlyUniqueId | string | *No description.* | +| TerraformMetaArguments | System.Collections.Generic.IDictionary | *No description.* | +| TerraformResourceType | string | *No description.* | +| TerraformGeneratorMetadata | HashiCorp.Cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| Connection | object | *No description.* | +| Count | object | *No description.* | +| DependsOn | string[] | *No description.* | +| ForEach | HashiCorp.Cdktf.ITerraformIterator | *No description.* | +| Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | +| Provisioners | object[] | *No description.* | +| Fingerprint | string | *No description.* | +| AppIdInput | double | *No description.* | +| IdInput | string | *No description.* | +| NameInput | string | *No description.* | +| NamespaceInput | string | *No description.* | +| PrivateKeyInput | string | *No description.* | +| AppId | double | *No description.* | +| Id | string | *No description.* | +| Name | string | *No description.* | +| Namespace | string | *No description.* | +| PrivateKey | string | *No description.* | + +--- + +##### `Node`Required + +```csharp +public Node Node { get; } +``` + +- *Type:* Constructs.Node + +The tree node. + +--- + +##### `CdktfStack`Required + +```csharp +public TerraformStack CdktfStack { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformStack + +--- + +##### `Fqn`Required + +```csharp +public string Fqn { get; } +``` + +- *Type:* string + +--- + +##### `FriendlyUniqueId`Required + +```csharp +public string FriendlyUniqueId { get; } +``` + +- *Type:* string + +--- + +##### `TerraformMetaArguments`Required + +```csharp +public System.Collections.Generic.IDictionary TerraformMetaArguments { get; } +``` + +- *Type:* System.Collections.Generic.IDictionary + +--- + +##### `TerraformResourceType`Required + +```csharp +public string TerraformResourceType { get; } +``` + +- *Type:* string + +--- + +##### `TerraformGeneratorMetadata`Optional + +```csharp +public TerraformProviderGeneratorMetadata TerraformGeneratorMetadata { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `Connection`Optional + +```csharp +public object Connection { get; } +``` + +- *Type:* object + +--- + +##### `Count`Optional + +```csharp +public object Count { get; } +``` + +- *Type:* object + +--- + +##### `DependsOn`Optional + +```csharp +public string[] DependsOn { get; } +``` + +- *Type:* string[] + +--- + +##### `ForEach`Optional + +```csharp +public ITerraformIterator ForEach { get; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```csharp +public TerraformResourceLifecycle Lifecycle { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```csharp +public TerraformProvider Provider { get; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```csharp +public object[] Provisioners { get; } +``` + +- *Type:* object[] + +--- + +##### `Fingerprint`Required + +```csharp +public string Fingerprint { get; } +``` + +- *Type:* string + +--- + +##### `AppIdInput`Optional + +```csharp +public double AppIdInput { get; } +``` + +- *Type:* double + +--- + +##### `IdInput`Optional + +```csharp +public string IdInput { get; } +``` + +- *Type:* string + +--- + +##### `NameInput`Optional + +```csharp +public string NameInput { get; } +``` + +- *Type:* string + +--- + +##### `NamespaceInput`Optional + +```csharp +public string NamespaceInput { get; } +``` + +- *Type:* string + +--- + +##### `PrivateKeyInput`Optional + +```csharp +public string PrivateKeyInput { get; } +``` + +- *Type:* string + +--- + +##### `AppId`Required + +```csharp +public double AppId { get; } +``` + +- *Type:* double + +--- + +##### `Id`Required + +```csharp +public string Id { get; } +``` + +- *Type:* string + +--- + +##### `Name`Required + +```csharp +public string Name { get; } +``` + +- *Type:* string + +--- + +##### `Namespace`Required + +```csharp +public string Namespace { get; } +``` + +- *Type:* string + +--- + +##### `PrivateKey`Required + +```csharp +public string PrivateKey { get; } +``` + +- *Type:* string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| TfResourceType | string | *No description.* | + +--- + +##### `TfResourceType`Required + +```csharp +public string TfResourceType { get; } +``` + +- *Type:* string + +--- + +## Structs + +### SecretsSyncGithubAppsConfig + +#### Initializer + +```csharp +using HashiCorp.Cdktf.Providers.Vault; + +new SecretsSyncGithubAppsConfig { + object Connection = null, + object Count = null, + ITerraformDependable[] DependsOn = null, + ITerraformIterator ForEach = null, + TerraformResourceLifecycle Lifecycle = null, + TerraformProvider Provider = null, + object[] Provisioners = null, + double AppId, + string Name, + string PrivateKey, + string Id = null, + string Namespace = null +}; +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Connection | object | *No description.* | +| Count | object | *No description.* | +| DependsOn | HashiCorp.Cdktf.ITerraformDependable[] | *No description.* | +| ForEach | HashiCorp.Cdktf.ITerraformIterator | *No description.* | +| Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | +| Provisioners | object[] | *No description.* | +| AppId | double | The GitHub application ID. | +| Name | string | The user-defined name of the GitHub App configuration. | +| PrivateKey | string | The content of a PEM formatted private key generated on GitHub for the app. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. | +| Namespace | string | Target namespace. (requires Enterprise). | + +--- + +##### `Connection`Optional + +```csharp +public object Connection { get; set; } +``` + +- *Type:* object + +--- + +##### `Count`Optional + +```csharp +public object Count { get; set; } +``` + +- *Type:* object + +--- + +##### `DependsOn`Optional + +```csharp +public ITerraformDependable[] DependsOn { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformDependable[] + +--- + +##### `ForEach`Optional + +```csharp +public ITerraformIterator ForEach { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```csharp +public TerraformResourceLifecycle Lifecycle { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```csharp +public TerraformProvider Provider { get; set; } +``` + +- *Type:* HashiCorp.Cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```csharp +public object[] Provisioners { get; set; } +``` + +- *Type:* object[] + +--- + +##### `AppId`Required + +```csharp +public double AppId { get; set; } +``` + +- *Type:* double + +The GitHub application ID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#app_id SecretsSyncGithubApps#app_id} + +--- + +##### `Name`Required + +```csharp +public string Name { get; set; } +``` + +- *Type:* string + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#name SecretsSyncGithubApps#name} + +--- + +##### `PrivateKey`Required + +```csharp +public string PrivateKey { get; set; } +``` + +- *Type:* string + +The content of a PEM formatted private key generated on GitHub for the app. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#private_key SecretsSyncGithubApps#private_key} + +--- + +##### `Id`Optional + +```csharp +public string Id { get; set; } +``` + +- *Type:* string + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `Namespace`Optional + +```csharp +public string Namespace { get; set; } +``` + +- *Type:* string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#namespace SecretsSyncGithubApps#namespace} + +--- + + + diff --git a/docs/secretsSyncGithubApps.go.md b/docs/secretsSyncGithubApps.go.md new file mode 100644 index 00000000..7a86e7d1 --- /dev/null +++ b/docs/secretsSyncGithubApps.go.md @@ -0,0 +1,984 @@ +# `secretsSyncGithubApps` Submodule + +## Constructs + +### SecretsSyncGithubApps + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps vault_secrets_sync_github_apps}. + +#### Initializers + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgithubapps" + +secretssyncgithubapps.NewSecretsSyncGithubApps(scope Construct, id *string, config SecretsSyncGithubAppsConfig) SecretsSyncGithubApps +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | github.com/aws/constructs-go/constructs/v10.Construct | The scope in which to define this construct. | +| id | *string | The scoped construct ID. | +| config | SecretsSyncGithubAppsConfig | *No description.* | + +--- + +##### `scope`Required + +- *Type:* github.com/aws/constructs-go/constructs/v10.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* *string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `config`Required + +- *Type:* SecretsSyncGithubAppsConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| ToString | Returns a string representation of this construct. | +| AddOverride | *No description.* | +| OverrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| ResetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| ToHclTerraform | *No description.* | +| ToMetadata | *No description.* | +| ToTerraform | Adds this resource to the terraform JSON output. | +| AddMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| GetAnyMapAttribute | *No description.* | +| GetBooleanAttribute | *No description.* | +| GetBooleanMapAttribute | *No description.* | +| GetListAttribute | *No description.* | +| GetNumberAttribute | *No description.* | +| GetNumberListAttribute | *No description.* | +| GetNumberMapAttribute | *No description.* | +| GetStringAttribute | *No description.* | +| GetStringMapAttribute | *No description.* | +| HasResourceMove | *No description.* | +| ImportFrom | *No description.* | +| InterpolationForAttribute | *No description.* | +| MoveFromId | Move the resource corresponding to "id" to this resource. | +| MoveTo | Moves this resource to the target resource given by moveTarget. | +| MoveToId | Moves this resource to the resource corresponding to "id". | +| ResetId | *No description.* | +| ResetNamespace | *No description.* | + +--- + +##### `ToString` + +```go +func ToString() *string +``` + +Returns a string representation of this construct. + +##### `AddOverride` + +```go +func AddOverride(path *string, value interface{}) +``` + +###### `path`Required + +- *Type:* *string + +--- + +###### `value`Required + +- *Type:* interface{} + +--- + +##### `OverrideLogicalId` + +```go +func OverrideLogicalId(newLogicalId *string) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* *string + +The new logical ID to use for this stack element. + +--- + +##### `ResetOverrideLogicalId` + +```go +func ResetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `ToHclTerraform` + +```go +func ToHclTerraform() interface{} +``` + +##### `ToMetadata` + +```go +func ToMetadata() interface{} +``` + +##### `ToTerraform` + +```go +func ToTerraform() interface{} +``` + +Adds this resource to the terraform JSON output. + +##### `AddMoveTarget` + +```go +func AddMoveTarget(moveTarget *string) +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `moveTarget`Required + +- *Type:* *string + +The string move target that will correspond to this resource. + +--- + +##### `GetAnyMapAttribute` + +```go +func GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetBooleanAttribute` + +```go +func GetBooleanAttribute(terraformAttribute *string) IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetBooleanMapAttribute` + +```go +func GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetListAttribute` + +```go +func GetListAttribute(terraformAttribute *string) *[]*string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberAttribute` + +```go +func GetNumberAttribute(terraformAttribute *string) *f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberListAttribute` + +```go +func GetNumberListAttribute(terraformAttribute *string) *[]*f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetNumberMapAttribute` + +```go +func GetNumberMapAttribute(terraformAttribute *string) *map[string]*f64 +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetStringAttribute` + +```go +func GetStringAttribute(terraformAttribute *string) *string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `GetStringMapAttribute` + +```go +func GetStringMapAttribute(terraformAttribute *string) *map[string]*string +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `HasResourceMove` + +```go +func HasResourceMove() interface{} +``` + +##### `ImportFrom` + +```go +func ImportFrom(id *string, provider TerraformProvider) +``` + +###### `id`Required + +- *Type:* *string + +--- + +###### `provider`Optional + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `InterpolationForAttribute` + +```go +func InterpolationForAttribute(terraformAttribute *string) IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* *string + +--- + +##### `MoveFromId` + +```go +func MoveFromId(id *string) +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `id`Required + +- *Type:* *string + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `MoveTo` + +```go +func MoveTo(moveTarget *string, index interface{}) +``` + +Moves this resource to the target resource given by moveTarget. + +###### `moveTarget`Required + +- *Type:* *string + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `index`Optional + +- *Type:* interface{} + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `MoveToId` + +```go +func MoveToId(id *string) +``` + +Moves this resource to the resource corresponding to "id". + +###### `id`Required + +- *Type:* *string + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `ResetId` + +```go +func ResetId() +``` + +##### `ResetNamespace` + +```go +func ResetNamespace() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| IsConstruct | Checks if `x` is a construct. | +| IsTerraformElement | *No description.* | +| IsTerraformResource | *No description.* | +| GenerateConfigForImport | Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". | + +--- + +##### `IsConstruct` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgithubapps" + +secretssyncgithubapps.SecretsSyncGithubApps_IsConstruct(x interface{}) *bool +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* interface{} + +Any object. + +--- + +##### `IsTerraformElement` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgithubapps" + +secretssyncgithubapps.SecretsSyncGithubApps_IsTerraformElement(x interface{}) *bool +``` + +###### `x`Required + +- *Type:* interface{} + +--- + +##### `IsTerraformResource` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgithubapps" + +secretssyncgithubapps.SecretsSyncGithubApps_IsTerraformResource(x interface{}) *bool +``` + +###### `x`Required + +- *Type:* interface{} + +--- + +##### `GenerateConfigForImport` + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgithubapps" + +secretssyncgithubapps.SecretsSyncGithubApps_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource +``` + +Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". + +###### `scope`Required + +- *Type:* github.com/aws/constructs-go/constructs/v10.Construct + +The scope in which to define this construct. + +--- + +###### `importToId`Required + +- *Type:* *string + +The construct id used in the generated config for the SecretsSyncGithubApps to import. + +--- + +###### `importFromId`Required + +- *Type:* *string + +The id of the existing SecretsSyncGithubApps that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#import import section} in the documentation of this resource for the id to use + +--- + +###### `provider`Optional + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +? Optional instance of the provider where the SecretsSyncGithubApps to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Node | github.com/aws/constructs-go/constructs/v10.Node | The tree node. | +| CdktfStack | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack | *No description.* | +| Fqn | *string | *No description.* | +| FriendlyUniqueId | *string | *No description.* | +| TerraformMetaArguments | *map[string]interface{} | *No description.* | +| TerraformResourceType | *string | *No description.* | +| TerraformGeneratorMetadata | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| Connection | interface{} | *No description.* | +| Count | interface{} | *No description.* | +| DependsOn | *[]*string | *No description.* | +| ForEach | github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator | *No description.* | +| Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | +| Provisioners | *[]interface{} | *No description.* | +| Fingerprint | *string | *No description.* | +| AppIdInput | *f64 | *No description.* | +| IdInput | *string | *No description.* | +| NameInput | *string | *No description.* | +| NamespaceInput | *string | *No description.* | +| PrivateKeyInput | *string | *No description.* | +| AppId | *f64 | *No description.* | +| Id | *string | *No description.* | +| Name | *string | *No description.* | +| Namespace | *string | *No description.* | +| PrivateKey | *string | *No description.* | + +--- + +##### `Node`Required + +```go +func Node() Node +``` + +- *Type:* github.com/aws/constructs-go/constructs/v10.Node + +The tree node. + +--- + +##### `CdktfStack`Required + +```go +func CdktfStack() TerraformStack +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformStack + +--- + +##### `Fqn`Required + +```go +func Fqn() *string +``` + +- *Type:* *string + +--- + +##### `FriendlyUniqueId`Required + +```go +func FriendlyUniqueId() *string +``` + +- *Type:* *string + +--- + +##### `TerraformMetaArguments`Required + +```go +func TerraformMetaArguments() *map[string]interface{} +``` + +- *Type:* *map[string]interface{} + +--- + +##### `TerraformResourceType`Required + +```go +func TerraformResourceType() *string +``` + +- *Type:* *string + +--- + +##### `TerraformGeneratorMetadata`Optional + +```go +func TerraformGeneratorMetadata() TerraformProviderGeneratorMetadata +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `Connection`Optional + +```go +func Connection() interface{} +``` + +- *Type:* interface{} + +--- + +##### `Count`Optional + +```go +func Count() interface{} +``` + +- *Type:* interface{} + +--- + +##### `DependsOn`Optional + +```go +func DependsOn() *[]*string +``` + +- *Type:* *[]*string + +--- + +##### `ForEach`Optional + +```go +func ForEach() ITerraformIterator +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```go +func Lifecycle() TerraformResourceLifecycle +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```go +func Provider() TerraformProvider +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```go +func Provisioners() *[]interface{} +``` + +- *Type:* *[]interface{} + +--- + +##### `Fingerprint`Required + +```go +func Fingerprint() *string +``` + +- *Type:* *string + +--- + +##### `AppIdInput`Optional + +```go +func AppIdInput() *f64 +``` + +- *Type:* *f64 + +--- + +##### `IdInput`Optional + +```go +func IdInput() *string +``` + +- *Type:* *string + +--- + +##### `NameInput`Optional + +```go +func NameInput() *string +``` + +- *Type:* *string + +--- + +##### `NamespaceInput`Optional + +```go +func NamespaceInput() *string +``` + +- *Type:* *string + +--- + +##### `PrivateKeyInput`Optional + +```go +func PrivateKeyInput() *string +``` + +- *Type:* *string + +--- + +##### `AppId`Required + +```go +func AppId() *f64 +``` + +- *Type:* *f64 + +--- + +##### `Id`Required + +```go +func Id() *string +``` + +- *Type:* *string + +--- + +##### `Name`Required + +```go +func Name() *string +``` + +- *Type:* *string + +--- + +##### `Namespace`Required + +```go +func Namespace() *string +``` + +- *Type:* *string + +--- + +##### `PrivateKey`Required + +```go +func PrivateKey() *string +``` + +- *Type:* *string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| TfResourceType | *string | *No description.* | + +--- + +##### `TfResourceType`Required + +```go +func TfResourceType() *string +``` + +- *Type:* *string + +--- + +## Structs + +### SecretsSyncGithubAppsConfig + +#### Initializer + +```go +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncgithubapps" + +&secretssyncgithubapps.SecretsSyncGithubAppsConfig { + Connection: interface{}, + Count: interface{}, + DependsOn: *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable, + ForEach: github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator, + Lifecycle: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle, + Provider: github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider, + Provisioners: *[]interface{}, + AppId: *f64, + Name: *string, + PrivateKey: *string, + Id: *string, + Namespace: *string, +} +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| Connection | interface{} | *No description.* | +| Count | interface{} | *No description.* | +| DependsOn | *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable | *No description.* | +| ForEach | github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator | *No description.* | +| Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | +| Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | +| Provisioners | *[]interface{} | *No description.* | +| AppId | *f64 | The GitHub application ID. | +| Name | *string | The user-defined name of the GitHub App configuration. | +| PrivateKey | *string | The content of a PEM formatted private key generated on GitHub for the app. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. | +| Namespace | *string | Target namespace. (requires Enterprise). | + +--- + +##### `Connection`Optional + +```go +Connection interface{} +``` + +- *Type:* interface{} + +--- + +##### `Count`Optional + +```go +Count interface{} +``` + +- *Type:* interface{} + +--- + +##### `DependsOn`Optional + +```go +DependsOn *[]ITerraformDependable +``` + +- *Type:* *[]github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformDependable + +--- + +##### `ForEach`Optional + +```go +ForEach ITerraformIterator +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.ITerraformIterator + +--- + +##### `Lifecycle`Optional + +```go +Lifecycle TerraformResourceLifecycle +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle + +--- + +##### `Provider`Optional + +```go +Provider TerraformProvider +``` + +- *Type:* github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider + +--- + +##### `Provisioners`Optional + +```go +Provisioners *[]interface{} +``` + +- *Type:* *[]interface{} + +--- + +##### `AppId`Required + +```go +AppId *f64 +``` + +- *Type:* *f64 + +The GitHub application ID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#app_id SecretsSyncGithubApps#app_id} + +--- + +##### `Name`Required + +```go +Name *string +``` + +- *Type:* *string + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#name SecretsSyncGithubApps#name} + +--- + +##### `PrivateKey`Required + +```go +PrivateKey *string +``` + +- *Type:* *string + +The content of a PEM formatted private key generated on GitHub for the app. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#private_key SecretsSyncGithubApps#private_key} + +--- + +##### `Id`Optional + +```go +Id *string +``` + +- *Type:* *string + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `Namespace`Optional + +```go +Namespace *string +``` + +- *Type:* *string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#namespace SecretsSyncGithubApps#namespace} + +--- + + + diff --git a/docs/secretsSyncGithubApps.java.md b/docs/secretsSyncGithubApps.java.md new file mode 100644 index 00000000..a9936dde --- /dev/null +++ b/docs/secretsSyncGithubApps.java.md @@ -0,0 +1,1105 @@ +# `secretsSyncGithubApps` Submodule + +## Constructs + +### SecretsSyncGithubApps + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps vault_secrets_sync_github_apps}. + +#### Initializers + +```java +import com.hashicorp.cdktf.providers.vault.secrets_sync_github_apps.SecretsSyncGithubApps; + +SecretsSyncGithubApps.Builder.create(Construct scope, java.lang.String id) +// .connection(SSHProvisionerConnection) +// .connection(WinrmProvisionerConnection) +// .count(java.lang.Number) +// .count(TerraformCount) +// .dependsOn(java.util.List) +// .forEach(ITerraformIterator) +// .lifecycle(TerraformResourceLifecycle) +// .provider(TerraformProvider) +// .provisioners(java.util.List) + .appId(java.lang.Number) + .name(java.lang.String) + .privateKey(java.lang.String) +// .id(java.lang.String) +// .namespace(java.lang.String) + .build(); +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | software.constructs.Construct | The scope in which to define this construct. | +| id | java.lang.String | The scoped construct ID. | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number OR com.hashicorp.cdktf.TerraformCount | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| appId | java.lang.Number | The GitHub application ID. | +| name | java.lang.String | The user-defined name of the GitHub App configuration. | +| privateKey | java.lang.String | The content of a PEM formatted private key generated on GitHub for the app. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. | +| namespace | java.lang.String | Target namespace. (requires Enterprise). | + +--- + +##### `scope`Required + +- *Type:* software.constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* java.lang.String + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `connection`Optional + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +- *Type:* java.lang.Number OR com.hashicorp.cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +- *Type:* java.util.List + +--- + +##### `appId`Required + +- *Type:* java.lang.Number + +The GitHub application ID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#app_id SecretsSyncGithubApps#app_id} + +--- + +##### `name`Required + +- *Type:* java.lang.String + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#name SecretsSyncGithubApps#name} + +--- + +##### `privateKey`Required + +- *Type:* java.lang.String + +The content of a PEM formatted private key generated on GitHub for the app. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#private_key SecretsSyncGithubApps#private_key} + +--- + +##### `id`Optional + +- *Type:* java.lang.String + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +- *Type:* java.lang.String + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#namespace SecretsSyncGithubApps#namespace} + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| toString | Returns a string representation of this construct. | +| addOverride | *No description.* | +| overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | +| toMetadata | *No description.* | +| toTerraform | Adds this resource to the terraform JSON output. | +| addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| getAnyMapAttribute | *No description.* | +| getBooleanAttribute | *No description.* | +| getBooleanMapAttribute | *No description.* | +| getListAttribute | *No description.* | +| getNumberAttribute | *No description.* | +| getNumberListAttribute | *No description.* | +| getNumberMapAttribute | *No description.* | +| getStringAttribute | *No description.* | +| getStringMapAttribute | *No description.* | +| hasResourceMove | *No description.* | +| importFrom | *No description.* | +| interpolationForAttribute | *No description.* | +| moveFromId | Move the resource corresponding to "id" to this resource. | +| moveTo | Moves this resource to the target resource given by moveTarget. | +| moveToId | Moves this resource to the resource corresponding to "id". | +| resetId | *No description.* | +| resetNamespace | *No description.* | + +--- + +##### `toString` + +```java +public java.lang.String toString() +``` + +Returns a string representation of this construct. + +##### `addOverride` + +```java +public void addOverride(java.lang.String path, java.lang.Object value) +``` + +###### `path`Required + +- *Type:* java.lang.String + +--- + +###### `value`Required + +- *Type:* java.lang.Object + +--- + +##### `overrideLogicalId` + +```java +public void overrideLogicalId(java.lang.String newLogicalId) +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* java.lang.String + +The new logical ID to use for this stack element. + +--- + +##### `resetOverrideLogicalId` + +```java +public void resetOverrideLogicalId() +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `toHclTerraform` + +```java +public java.lang.Object toHclTerraform() +``` + +##### `toMetadata` + +```java +public java.lang.Object toMetadata() +``` + +##### `toTerraform` + +```java +public java.lang.Object toTerraform() +``` + +Adds this resource to the terraform JSON output. + +##### `addMoveTarget` + +```java +public void addMoveTarget(java.lang.String moveTarget) +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `moveTarget`Required + +- *Type:* java.lang.String + +The string move target that will correspond to this resource. + +--- + +##### `getAnyMapAttribute` + +```java +public java.util.Map getAnyMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getBooleanAttribute` + +```java +public IResolvable getBooleanAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getBooleanMapAttribute` + +```java +public java.util.Map getBooleanMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getListAttribute` + +```java +public java.util.List getListAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberAttribute` + +```java +public java.lang.Number getNumberAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberListAttribute` + +```java +public java.util.List getNumberListAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getNumberMapAttribute` + +```java +public java.util.Map getNumberMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getStringAttribute` + +```java +public java.lang.String getStringAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `getStringMapAttribute` + +```java +public java.util.Map getStringMapAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `hasResourceMove` + +```java +public TerraformResourceMoveByTarget OR TerraformResourceMoveById hasResourceMove() +``` + +##### `importFrom` + +```java +public void importFrom(java.lang.String id) +public void importFrom(java.lang.String id, TerraformProvider provider) +``` + +###### `id`Required + +- *Type:* java.lang.String + +--- + +###### `provider`Optional + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `interpolationForAttribute` + +```java +public IResolvable interpolationForAttribute(java.lang.String terraformAttribute) +``` + +###### `terraformAttribute`Required + +- *Type:* java.lang.String + +--- + +##### `moveFromId` + +```java +public void moveFromId(java.lang.String id) +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `id`Required + +- *Type:* java.lang.String + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `moveTo` + +```java +public void moveTo(java.lang.String moveTarget) +public void moveTo(java.lang.String moveTarget, java.lang.String OR java.lang.Number index) +``` + +Moves this resource to the target resource given by moveTarget. + +###### `moveTarget`Required + +- *Type:* java.lang.String + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `index`Optional + +- *Type:* java.lang.String OR java.lang.Number + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `moveToId` + +```java +public void moveToId(java.lang.String id) +``` + +Moves this resource to the resource corresponding to "id". + +###### `id`Required + +- *Type:* java.lang.String + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `resetId` + +```java +public void resetId() +``` + +##### `resetNamespace` + +```java +public void resetNamespace() +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| isConstruct | Checks if `x` is a construct. | +| isTerraformElement | *No description.* | +| isTerraformResource | *No description.* | +| generateConfigForImport | Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". | + +--- + +##### `isConstruct` + +```java +import com.hashicorp.cdktf.providers.vault.secrets_sync_github_apps.SecretsSyncGithubApps; + +SecretsSyncGithubApps.isConstruct(java.lang.Object x) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* java.lang.Object + +Any object. + +--- + +##### `isTerraformElement` + +```java +import com.hashicorp.cdktf.providers.vault.secrets_sync_github_apps.SecretsSyncGithubApps; + +SecretsSyncGithubApps.isTerraformElement(java.lang.Object x) +``` + +###### `x`Required + +- *Type:* java.lang.Object + +--- + +##### `isTerraformResource` + +```java +import com.hashicorp.cdktf.providers.vault.secrets_sync_github_apps.SecretsSyncGithubApps; + +SecretsSyncGithubApps.isTerraformResource(java.lang.Object x) +``` + +###### `x`Required + +- *Type:* java.lang.Object + +--- + +##### `generateConfigForImport` + +```java +import com.hashicorp.cdktf.providers.vault.secrets_sync_github_apps.SecretsSyncGithubApps; + +SecretsSyncGithubApps.generateConfigForImport(Construct scope, java.lang.String importToId, java.lang.String importFromId),SecretsSyncGithubApps.generateConfigForImport(Construct scope, java.lang.String importToId, java.lang.String importFromId, TerraformProvider provider) +``` + +Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". + +###### `scope`Required + +- *Type:* software.constructs.Construct + +The scope in which to define this construct. + +--- + +###### `importToId`Required + +- *Type:* java.lang.String + +The construct id used in the generated config for the SecretsSyncGithubApps to import. + +--- + +###### `importFromId`Required + +- *Type:* java.lang.String + +The id of the existing SecretsSyncGithubApps that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#import import section} in the documentation of this resource for the id to use + +--- + +###### `provider`Optional + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +? Optional instance of the provider where the SecretsSyncGithubApps to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | software.constructs.Node | The tree node. | +| cdktfStack | com.hashicorp.cdktf.TerraformStack | *No description.* | +| fqn | java.lang.String | *No description.* | +| friendlyUniqueId | java.lang.String | *No description.* | +| terraformMetaArguments | java.util.Map | *No description.* | +| terraformResourceType | java.lang.String | *No description.* | +| terraformGeneratorMetadata | com.hashicorp.cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number OR com.hashicorp.cdktf.TerraformCount | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| fingerprint | java.lang.String | *No description.* | +| appIdInput | java.lang.Number | *No description.* | +| idInput | java.lang.String | *No description.* | +| nameInput | java.lang.String | *No description.* | +| namespaceInput | java.lang.String | *No description.* | +| privateKeyInput | java.lang.String | *No description.* | +| appId | java.lang.Number | *No description.* | +| id | java.lang.String | *No description.* | +| name | java.lang.String | *No description.* | +| namespace | java.lang.String | *No description.* | +| privateKey | java.lang.String | *No description.* | + +--- + +##### `node`Required + +```java +public Node getNode(); +``` + +- *Type:* software.constructs.Node + +The tree node. + +--- + +##### `cdktfStack`Required + +```java +public TerraformStack getCdktfStack(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformStack + +--- + +##### `fqn`Required + +```java +public java.lang.String getFqn(); +``` + +- *Type:* java.lang.String + +--- + +##### `friendlyUniqueId`Required + +```java +public java.lang.String getFriendlyUniqueId(); +``` + +- *Type:* java.lang.String + +--- + +##### `terraformMetaArguments`Required + +```java +public java.util.Map getTerraformMetaArguments(); +``` + +- *Type:* java.util.Map + +--- + +##### `terraformResourceType`Required + +```java +public java.lang.String getTerraformResourceType(); +``` + +- *Type:* java.lang.String + +--- + +##### `terraformGeneratorMetadata`Optional + +```java +public TerraformProviderGeneratorMetadata getTerraformGeneratorMetadata(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```java +public java.lang.Object getConnection(); +``` + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```java +public java.lang.Object getCount(); +``` + +- *Type:* java.lang.Number OR com.hashicorp.cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +```java +public java.util.List getDependsOn(); +``` + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +```java +public ITerraformIterator getForEach(); +``` + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```java +public TerraformResourceLifecycle getLifecycle(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```java +public TerraformProvider getProvider(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```java +public java.lang.Object getProvisioners(); +``` + +- *Type:* java.util.List + +--- + +##### `fingerprint`Required + +```java +public java.lang.String getFingerprint(); +``` + +- *Type:* java.lang.String + +--- + +##### `appIdInput`Optional + +```java +public java.lang.Number getAppIdInput(); +``` + +- *Type:* java.lang.Number + +--- + +##### `idInput`Optional + +```java +public java.lang.String getIdInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `nameInput`Optional + +```java +public java.lang.String getNameInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `namespaceInput`Optional + +```java +public java.lang.String getNamespaceInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `privateKeyInput`Optional + +```java +public java.lang.String getPrivateKeyInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `appId`Required + +```java +public java.lang.Number getAppId(); +``` + +- *Type:* java.lang.Number + +--- + +##### `id`Required + +```java +public java.lang.String getId(); +``` + +- *Type:* java.lang.String + +--- + +##### `name`Required + +```java +public java.lang.String getName(); +``` + +- *Type:* java.lang.String + +--- + +##### `namespace`Required + +```java +public java.lang.String getNamespace(); +``` + +- *Type:* java.lang.String + +--- + +##### `privateKey`Required + +```java +public java.lang.String getPrivateKey(); +``` + +- *Type:* java.lang.String + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | java.lang.String | *No description.* | + +--- + +##### `tfResourceType`Required + +```java +public java.lang.String getTfResourceType(); +``` + +- *Type:* java.lang.String + +--- + +## Structs + +### SecretsSyncGithubAppsConfig + +#### Initializer + +```java +import com.hashicorp.cdktf.providers.vault.secrets_sync_github_apps.SecretsSyncGithubAppsConfig; + +SecretsSyncGithubAppsConfig.builder() +// .connection(SSHProvisionerConnection) +// .connection(WinrmProvisionerConnection) +// .count(java.lang.Number) +// .count(TerraformCount) +// .dependsOn(java.util.List) +// .forEach(ITerraformIterator) +// .lifecycle(TerraformResourceLifecycle) +// .provider(TerraformProvider) +// .provisioners(java.util.List) + .appId(java.lang.Number) + .name(java.lang.String) + .privateKey(java.lang.String) +// .id(java.lang.String) +// .namespace(java.lang.String) + .build(); +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection | *No description.* | +| count | java.lang.Number OR com.hashicorp.cdktf.TerraformCount | *No description.* | +| dependsOn | java.util.List | *No description.* | +| forEach | com.hashicorp.cdktf.ITerraformIterator | *No description.* | +| lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | +| provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | +| provisioners | java.util.List | *No description.* | +| appId | java.lang.Number | The GitHub application ID. | +| name | java.lang.String | The user-defined name of the GitHub App configuration. | +| privateKey | java.lang.String | The content of a PEM formatted private key generated on GitHub for the app. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. | +| namespace | java.lang.String | Target namespace. (requires Enterprise). | + +--- + +##### `connection`Optional + +```java +public java.lang.Object getConnection(); +``` + +- *Type:* com.hashicorp.cdktf.SSHProvisionerConnection OR com.hashicorp.cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```java +public java.lang.Object getCount(); +``` + +- *Type:* java.lang.Number OR com.hashicorp.cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +```java +public java.util.List getDependsOn(); +``` + +- *Type:* java.util.List + +--- + +##### `forEach`Optional + +```java +public ITerraformIterator getForEach(); +``` + +- *Type:* com.hashicorp.cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```java +public TerraformResourceLifecycle getLifecycle(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```java +public TerraformProvider getProvider(); +``` + +- *Type:* com.hashicorp.cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```java +public java.lang.Object getProvisioners(); +``` + +- *Type:* java.util.List + +--- + +##### `appId`Required + +```java +public java.lang.Number getAppId(); +``` + +- *Type:* java.lang.Number + +The GitHub application ID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#app_id SecretsSyncGithubApps#app_id} + +--- + +##### `name`Required + +```java +public java.lang.String getName(); +``` + +- *Type:* java.lang.String + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#name SecretsSyncGithubApps#name} + +--- + +##### `privateKey`Required + +```java +public java.lang.String getPrivateKey(); +``` + +- *Type:* java.lang.String + +The content of a PEM formatted private key generated on GitHub for the app. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#private_key SecretsSyncGithubApps#private_key} + +--- + +##### `id`Optional + +```java +public java.lang.String getId(); +``` + +- *Type:* java.lang.String + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```java +public java.lang.String getNamespace(); +``` + +- *Type:* java.lang.String + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#namespace SecretsSyncGithubApps#namespace} + +--- + + + diff --git a/docs/secretsSyncGithubApps.python.md b/docs/secretsSyncGithubApps.python.md new file mode 100644 index 00000000..5636d97c --- /dev/null +++ b/docs/secretsSyncGithubApps.python.md @@ -0,0 +1,1145 @@ +# `secretsSyncGithubApps` Submodule + +## Constructs + +### SecretsSyncGithubApps + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps vault_secrets_sync_github_apps}. + +#### Initializers + +```python +from cdktf_cdktf_provider_vault import secrets_sync_github_apps + +secretsSyncGithubApps.SecretsSyncGithubApps( + scope: Construct, + id: str, + connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None, + count: typing.Union[typing.Union[int, float], TerraformCount] = None, + depends_on: typing.List[ITerraformDependable] = None, + for_each: ITerraformIterator = None, + lifecycle: TerraformResourceLifecycle = None, + provider: TerraformProvider = None, + provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, + app_id: typing.Union[int, float], + name: str, + private_key: str, + id: str = None, + namespace: str = None +) +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | constructs.Construct | The scope in which to define this construct. | +| id | str | The scoped construct ID. | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[typing.Union[int, float], cdktf.TerraformCount] | *No description.* | +| depends_on | typing.List[cdktf.ITerraformDependable] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| app_id | typing.Union[int, float] | The GitHub application ID. | +| name | str | The user-defined name of the GitHub App configuration. | +| private_key | str | The content of a PEM formatted private key generated on GitHub for the app. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. | +| namespace | str | Target namespace. (requires Enterprise). | + +--- + +##### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* str + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `connection`Optional + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +- *Type:* typing.Union[typing.Union[int, float], cdktf.TerraformCount] + +--- + +##### `depends_on`Optional + +- *Type:* typing.List[cdktf.ITerraformDependable] + +--- + +##### `for_each`Optional + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `app_id`Required + +- *Type:* typing.Union[int, float] + +The GitHub application ID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#app_id SecretsSyncGithubApps#app_id} + +--- + +##### `name`Required + +- *Type:* str + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#name SecretsSyncGithubApps#name} + +--- + +##### `private_key`Required + +- *Type:* str + +The content of a PEM formatted private key generated on GitHub for the app. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#private_key SecretsSyncGithubApps#private_key} + +--- + +##### `id`Optional + +- *Type:* str + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +- *Type:* str + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#namespace SecretsSyncGithubApps#namespace} + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| to_string | Returns a string representation of this construct. | +| add_override | *No description.* | +| override_logical_id | Overrides the auto-generated logical ID with a specific ID. | +| reset_override_logical_id | Resets a previously passed logical Id to use the auto-generated logical id again. | +| to_hcl_terraform | *No description.* | +| to_metadata | *No description.* | +| to_terraform | Adds this resource to the terraform JSON output. | +| add_move_target | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| get_any_map_attribute | *No description.* | +| get_boolean_attribute | *No description.* | +| get_boolean_map_attribute | *No description.* | +| get_list_attribute | *No description.* | +| get_number_attribute | *No description.* | +| get_number_list_attribute | *No description.* | +| get_number_map_attribute | *No description.* | +| get_string_attribute | *No description.* | +| get_string_map_attribute | *No description.* | +| has_resource_move | *No description.* | +| import_from | *No description.* | +| interpolation_for_attribute | *No description.* | +| move_from_id | Move the resource corresponding to "id" to this resource. | +| move_to | Moves this resource to the target resource given by moveTarget. | +| move_to_id | Moves this resource to the resource corresponding to "id". | +| reset_id | *No description.* | +| reset_namespace | *No description.* | + +--- + +##### `to_string` + +```python +def to_string() -> str +``` + +Returns a string representation of this construct. + +##### `add_override` + +```python +def add_override( + path: str, + value: typing.Any +) -> None +``` + +###### `path`Required + +- *Type:* str + +--- + +###### `value`Required + +- *Type:* typing.Any + +--- + +##### `override_logical_id` + +```python +def override_logical_id( + new_logical_id: str +) -> None +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `new_logical_id`Required + +- *Type:* str + +The new logical ID to use for this stack element. + +--- + +##### `reset_override_logical_id` + +```python +def reset_override_logical_id() -> None +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `to_hcl_terraform` + +```python +def to_hcl_terraform() -> typing.Any +``` + +##### `to_metadata` + +```python +def to_metadata() -> typing.Any +``` + +##### `to_terraform` + +```python +def to_terraform() -> typing.Any +``` + +Adds this resource to the terraform JSON output. + +##### `add_move_target` + +```python +def add_move_target( + move_target: str +) -> None +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `move_target`Required + +- *Type:* str + +The string move target that will correspond to this resource. + +--- + +##### `get_any_map_attribute` + +```python +def get_any_map_attribute( + terraform_attribute: str +) -> typing.Mapping[typing.Any] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_boolean_attribute` + +```python +def get_boolean_attribute( + terraform_attribute: str +) -> IResolvable +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_boolean_map_attribute` + +```python +def get_boolean_map_attribute( + terraform_attribute: str +) -> typing.Mapping[bool] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_list_attribute` + +```python +def get_list_attribute( + terraform_attribute: str +) -> typing.List[str] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_attribute` + +```python +def get_number_attribute( + terraform_attribute: str +) -> typing.Union[int, float] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_list_attribute` + +```python +def get_number_list_attribute( + terraform_attribute: str +) -> typing.List[typing.Union[int, float]] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_number_map_attribute` + +```python +def get_number_map_attribute( + terraform_attribute: str +) -> typing.Mapping[typing.Union[int, float]] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_string_attribute` + +```python +def get_string_attribute( + terraform_attribute: str +) -> str +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `get_string_map_attribute` + +```python +def get_string_map_attribute( + terraform_attribute: str +) -> typing.Mapping[str] +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `has_resource_move` + +```python +def has_resource_move() -> typing.Union[TerraformResourceMoveByTarget, TerraformResourceMoveById] +``` + +##### `import_from` + +```python +def import_from( + id: str, + provider: TerraformProvider = None +) -> None +``` + +###### `id`Required + +- *Type:* str + +--- + +###### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +--- + +##### `interpolation_for_attribute` + +```python +def interpolation_for_attribute( + terraform_attribute: str +) -> IResolvable +``` + +###### `terraform_attribute`Required + +- *Type:* str + +--- + +##### `move_from_id` + +```python +def move_from_id( + id: str +) -> None +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `id`Required + +- *Type:* str + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `move_to` + +```python +def move_to( + move_target: str, + index: typing.Union[str, typing.Union[int, float]] = None +) -> None +``` + +Moves this resource to the target resource given by moveTarget. + +###### `move_target`Required + +- *Type:* str + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `index`Optional + +- *Type:* typing.Union[str, typing.Union[int, float]] + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `move_to_id` + +```python +def move_to_id( + id: str +) -> None +``` + +Moves this resource to the resource corresponding to "id". + +###### `id`Required + +- *Type:* str + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `reset_id` + +```python +def reset_id() -> None +``` + +##### `reset_namespace` + +```python +def reset_namespace() -> None +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| is_construct | Checks if `x` is a construct. | +| is_terraform_element | *No description.* | +| is_terraform_resource | *No description.* | +| generate_config_for_import | Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". | + +--- + +##### `is_construct` + +```python +from cdktf_cdktf_provider_vault import secrets_sync_github_apps + +secretsSyncGithubApps.SecretsSyncGithubApps.is_construct( + x: typing.Any +) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* typing.Any + +Any object. + +--- + +##### `is_terraform_element` + +```python +from cdktf_cdktf_provider_vault import secrets_sync_github_apps + +secretsSyncGithubApps.SecretsSyncGithubApps.is_terraform_element( + x: typing.Any +) +``` + +###### `x`Required + +- *Type:* typing.Any + +--- + +##### `is_terraform_resource` + +```python +from cdktf_cdktf_provider_vault import secrets_sync_github_apps + +secretsSyncGithubApps.SecretsSyncGithubApps.is_terraform_resource( + x: typing.Any +) +``` + +###### `x`Required + +- *Type:* typing.Any + +--- + +##### `generate_config_for_import` + +```python +from cdktf_cdktf_provider_vault import secrets_sync_github_apps + +secretsSyncGithubApps.SecretsSyncGithubApps.generate_config_for_import( + scope: Construct, + import_to_id: str, + import_from_id: str, + provider: TerraformProvider = None +) +``` + +Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". + +###### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +###### `import_to_id`Required + +- *Type:* str + +The construct id used in the generated config for the SecretsSyncGithubApps to import. + +--- + +###### `import_from_id`Required + +- *Type:* str + +The id of the existing SecretsSyncGithubApps that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#import import section} in the documentation of this resource for the id to use + +--- + +###### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +? Optional instance of the provider where the SecretsSyncGithubApps to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | constructs.Node | The tree node. | +| cdktf_stack | cdktf.TerraformStack | *No description.* | +| fqn | str | *No description.* | +| friendly_unique_id | str | *No description.* | +| terraform_meta_arguments | typing.Mapping[typing.Any] | *No description.* | +| terraform_resource_type | str | *No description.* | +| terraform_generator_metadata | cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[typing.Union[int, float], cdktf.TerraformCount] | *No description.* | +| depends_on | typing.List[str] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| fingerprint | str | *No description.* | +| app_id_input | typing.Union[int, float] | *No description.* | +| id_input | str | *No description.* | +| name_input | str | *No description.* | +| namespace_input | str | *No description.* | +| private_key_input | str | *No description.* | +| app_id | typing.Union[int, float] | *No description.* | +| id | str | *No description.* | +| name | str | *No description.* | +| namespace | str | *No description.* | +| private_key | str | *No description.* | + +--- + +##### `node`Required + +```python +node: Node +``` + +- *Type:* constructs.Node + +The tree node. + +--- + +##### `cdktf_stack`Required + +```python +cdktf_stack: TerraformStack +``` + +- *Type:* cdktf.TerraformStack + +--- + +##### `fqn`Required + +```python +fqn: str +``` + +- *Type:* str + +--- + +##### `friendly_unique_id`Required + +```python +friendly_unique_id: str +``` + +- *Type:* str + +--- + +##### `terraform_meta_arguments`Required + +```python +terraform_meta_arguments: typing.Mapping[typing.Any] +``` + +- *Type:* typing.Mapping[typing.Any] + +--- + +##### `terraform_resource_type`Required + +```python +terraform_resource_type: str +``` + +- *Type:* str + +--- + +##### `terraform_generator_metadata`Optional + +```python +terraform_generator_metadata: TerraformProviderGeneratorMetadata +``` + +- *Type:* cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```python +connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] +``` + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +```python +count: typing.Union[typing.Union[int, float], TerraformCount] +``` + +- *Type:* typing.Union[typing.Union[int, float], cdktf.TerraformCount] + +--- + +##### `depends_on`Optional + +```python +depends_on: typing.List[str] +``` + +- *Type:* typing.List[str] + +--- + +##### `for_each`Optional + +```python +for_each: ITerraformIterator +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```python +lifecycle: TerraformResourceLifecycle +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```python +provider: TerraformProvider +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```python +provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] +``` + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `fingerprint`Required + +```python +fingerprint: str +``` + +- *Type:* str + +--- + +##### `app_id_input`Optional + +```python +app_id_input: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + +##### `id_input`Optional + +```python +id_input: str +``` + +- *Type:* str + +--- + +##### `name_input`Optional + +```python +name_input: str +``` + +- *Type:* str + +--- + +##### `namespace_input`Optional + +```python +namespace_input: str +``` + +- *Type:* str + +--- + +##### `private_key_input`Optional + +```python +private_key_input: str +``` + +- *Type:* str + +--- + +##### `app_id`Required + +```python +app_id: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + +##### `id`Required + +```python +id: str +``` + +- *Type:* str + +--- + +##### `name`Required + +```python +name: str +``` + +- *Type:* str + +--- + +##### `namespace`Required + +```python +namespace: str +``` + +- *Type:* str + +--- + +##### `private_key`Required + +```python +private_key: str +``` + +- *Type:* str + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | str | *No description.* | + +--- + +##### `tfResourceType`Required + +```python +tfResourceType: str +``` + +- *Type:* str + +--- + +## Structs + +### SecretsSyncGithubAppsConfig + +#### Initializer + +```python +from cdktf_cdktf_provider_vault import secrets_sync_github_apps + +secretsSyncGithubApps.SecretsSyncGithubAppsConfig( + connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None, + count: typing.Union[typing.Union[int, float], TerraformCount] = None, + depends_on: typing.List[ITerraformDependable] = None, + for_each: ITerraformIterator = None, + lifecycle: TerraformResourceLifecycle = None, + provider: TerraformProvider = None, + provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None, + app_id: typing.Union[int, float], + name: str, + private_key: str, + id: str = None, + namespace: str = None +) +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] | *No description.* | +| count | typing.Union[typing.Union[int, float], cdktf.TerraformCount] | *No description.* | +| depends_on | typing.List[cdktf.ITerraformDependable] | *No description.* | +| for_each | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | +| app_id | typing.Union[int, float] | The GitHub application ID. | +| name | str | The user-defined name of the GitHub App configuration. | +| private_key | str | The content of a PEM formatted private key generated on GitHub for the app. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. | +| namespace | str | Target namespace. (requires Enterprise). | + +--- + +##### `connection`Optional + +```python +connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] +``` + +- *Type:* typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] + +--- + +##### `count`Optional + +```python +count: typing.Union[typing.Union[int, float], TerraformCount] +``` + +- *Type:* typing.Union[typing.Union[int, float], cdktf.TerraformCount] + +--- + +##### `depends_on`Optional + +```python +depends_on: typing.List[ITerraformDependable] +``` + +- *Type:* typing.List[cdktf.ITerraformDependable] + +--- + +##### `for_each`Optional + +```python +for_each: ITerraformIterator +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```python +lifecycle: TerraformResourceLifecycle +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```python +provider: TerraformProvider +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```python +provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] +``` + +- *Type:* typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] + +--- + +##### `app_id`Required + +```python +app_id: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +The GitHub application ID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#app_id SecretsSyncGithubApps#app_id} + +--- + +##### `name`Required + +```python +name: str +``` + +- *Type:* str + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#name SecretsSyncGithubApps#name} + +--- + +##### `private_key`Required + +```python +private_key: str +``` + +- *Type:* str + +The content of a PEM formatted private key generated on GitHub for the app. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#private_key SecretsSyncGithubApps#private_key} + +--- + +##### `id`Optional + +```python +id: str +``` + +- *Type:* str + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```python +namespace: str +``` + +- *Type:* str + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#namespace SecretsSyncGithubApps#namespace} + +--- + + + diff --git a/docs/secretsSyncGithubApps.typescript.md b/docs/secretsSyncGithubApps.typescript.md new file mode 100644 index 00000000..42f2efd2 --- /dev/null +++ b/docs/secretsSyncGithubApps.typescript.md @@ -0,0 +1,971 @@ +# `secretsSyncGithubApps` Submodule + +## Constructs + +### SecretsSyncGithubApps + +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps vault_secrets_sync_github_apps}. + +#### Initializers + +```typescript +import { secretsSyncGithubApps } from '@cdktf/provider-vault' + +new secretsSyncGithubApps.SecretsSyncGithubApps(scope: Construct, id: string, config: SecretsSyncGithubAppsConfig) +``` + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| scope | constructs.Construct | The scope in which to define this construct. | +| id | string | The scoped construct ID. | +| config | SecretsSyncGithubAppsConfig | *No description.* | + +--- + +##### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +##### `id`Required + +- *Type:* string + +The scoped construct ID. + +Must be unique amongst siblings in the same scope + +--- + +##### `config`Required + +- *Type:* SecretsSyncGithubAppsConfig + +--- + +#### Methods + +| **Name** | **Description** | +| --- | --- | +| toString | Returns a string representation of this construct. | +| addOverride | *No description.* | +| overrideLogicalId | Overrides the auto-generated logical ID with a specific ID. | +| resetOverrideLogicalId | Resets a previously passed logical Id to use the auto-generated logical id again. | +| toHclTerraform | *No description.* | +| toMetadata | *No description.* | +| toTerraform | Adds this resource to the terraform JSON output. | +| addMoveTarget | Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. | +| getAnyMapAttribute | *No description.* | +| getBooleanAttribute | *No description.* | +| getBooleanMapAttribute | *No description.* | +| getListAttribute | *No description.* | +| getNumberAttribute | *No description.* | +| getNumberListAttribute | *No description.* | +| getNumberMapAttribute | *No description.* | +| getStringAttribute | *No description.* | +| getStringMapAttribute | *No description.* | +| hasResourceMove | *No description.* | +| importFrom | *No description.* | +| interpolationForAttribute | *No description.* | +| moveFromId | Move the resource corresponding to "id" to this resource. | +| moveTo | Moves this resource to the target resource given by moveTarget. | +| moveToId | Moves this resource to the resource corresponding to "id". | +| resetId | *No description.* | +| resetNamespace | *No description.* | + +--- + +##### `toString` + +```typescript +public toString(): string +``` + +Returns a string representation of this construct. + +##### `addOverride` + +```typescript +public addOverride(path: string, value: any): void +``` + +###### `path`Required + +- *Type:* string + +--- + +###### `value`Required + +- *Type:* any + +--- + +##### `overrideLogicalId` + +```typescript +public overrideLogicalId(newLogicalId: string): void +``` + +Overrides the auto-generated logical ID with a specific ID. + +###### `newLogicalId`Required + +- *Type:* string + +The new logical ID to use for this stack element. + +--- + +##### `resetOverrideLogicalId` + +```typescript +public resetOverrideLogicalId(): void +``` + +Resets a previously passed logical Id to use the auto-generated logical id again. + +##### `toHclTerraform` + +```typescript +public toHclTerraform(): any +``` + +##### `toMetadata` + +```typescript +public toMetadata(): any +``` + +##### `toTerraform` + +```typescript +public toTerraform(): any +``` + +Adds this resource to the terraform JSON output. + +##### `addMoveTarget` + +```typescript +public addMoveTarget(moveTarget: string): void +``` + +Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + +###### `moveTarget`Required + +- *Type:* string + +The string move target that will correspond to this resource. + +--- + +##### `getAnyMapAttribute` + +```typescript +public getAnyMapAttribute(terraformAttribute: string): {[ key: string ]: any} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getBooleanAttribute` + +```typescript +public getBooleanAttribute(terraformAttribute: string): IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getBooleanMapAttribute` + +```typescript +public getBooleanMapAttribute(terraformAttribute: string): {[ key: string ]: boolean} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getListAttribute` + +```typescript +public getListAttribute(terraformAttribute: string): string[] +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberAttribute` + +```typescript +public getNumberAttribute(terraformAttribute: string): number +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberListAttribute` + +```typescript +public getNumberListAttribute(terraformAttribute: string): number[] +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getNumberMapAttribute` + +```typescript +public getNumberMapAttribute(terraformAttribute: string): {[ key: string ]: number} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getStringAttribute` + +```typescript +public getStringAttribute(terraformAttribute: string): string +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `getStringMapAttribute` + +```typescript +public getStringMapAttribute(terraformAttribute: string): {[ key: string ]: string} +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `hasResourceMove` + +```typescript +public hasResourceMove(): TerraformResourceMoveByTarget | TerraformResourceMoveById +``` + +##### `importFrom` + +```typescript +public importFrom(id: string, provider?: TerraformProvider): void +``` + +###### `id`Required + +- *Type:* string + +--- + +###### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +--- + +##### `interpolationForAttribute` + +```typescript +public interpolationForAttribute(terraformAttribute: string): IResolvable +``` + +###### `terraformAttribute`Required + +- *Type:* string + +--- + +##### `moveFromId` + +```typescript +public moveFromId(id: string): void +``` + +Move the resource corresponding to "id" to this resource. + +Note that the resource being moved from must be marked as moved using it's instance function. + +###### `id`Required + +- *Type:* string + +Full id of resource being moved from, e.g. "aws_s3_bucket.example". + +--- + +##### `moveTo` + +```typescript +public moveTo(moveTarget: string, index?: string | number): void +``` + +Moves this resource to the target resource given by moveTarget. + +###### `moveTarget`Required + +- *Type:* string + +The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to. + +--- + +###### `index`Optional + +- *Type:* string | number + +Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to. + +--- + +##### `moveToId` + +```typescript +public moveToId(id: string): void +``` + +Moves this resource to the resource corresponding to "id". + +###### `id`Required + +- *Type:* string + +Full id of resource to move to, e.g. "aws_s3_bucket.example". + +--- + +##### `resetId` + +```typescript +public resetId(): void +``` + +##### `resetNamespace` + +```typescript +public resetNamespace(): void +``` + +#### Static Functions + +| **Name** | **Description** | +| --- | --- | +| isConstruct | Checks if `x` is a construct. | +| isTerraformElement | *No description.* | +| isTerraformResource | *No description.* | +| generateConfigForImport | Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". | + +--- + +##### `isConstruct` + +```typescript +import { secretsSyncGithubApps } from '@cdktf/provider-vault' + +secretsSyncGithubApps.SecretsSyncGithubApps.isConstruct(x: any) +``` + +Checks if `x` is a construct. + +Use this method instead of `instanceof` to properly detect `Construct` +instances, even when the construct library is symlinked. + +Explanation: in JavaScript, multiple copies of the `constructs` library on +disk are seen as independent, completely different libraries. As a +consequence, the class `Construct` in each copy of the `constructs` library +is seen as a different class, and an instance of one class will not test as +`instanceof` the other class. `npm install` will not create installations +like this, but users may manually symlink construct libraries together or +use a monorepo tool: in those cases, multiple copies of the `constructs` +library can be accidentally installed, and `instanceof` will behave +unpredictably. It is safest to avoid using `instanceof`, and using +this type-testing method instead. + +###### `x`Required + +- *Type:* any + +Any object. + +--- + +##### `isTerraformElement` + +```typescript +import { secretsSyncGithubApps } from '@cdktf/provider-vault' + +secretsSyncGithubApps.SecretsSyncGithubApps.isTerraformElement(x: any) +``` + +###### `x`Required + +- *Type:* any + +--- + +##### `isTerraformResource` + +```typescript +import { secretsSyncGithubApps } from '@cdktf/provider-vault' + +secretsSyncGithubApps.SecretsSyncGithubApps.isTerraformResource(x: any) +``` + +###### `x`Required + +- *Type:* any + +--- + +##### `generateConfigForImport` + +```typescript +import { secretsSyncGithubApps } from '@cdktf/provider-vault' + +secretsSyncGithubApps.SecretsSyncGithubApps.generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: TerraformProvider) +``` + +Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan ". + +###### `scope`Required + +- *Type:* constructs.Construct + +The scope in which to define this construct. + +--- + +###### `importToId`Required + +- *Type:* string + +The construct id used in the generated config for the SecretsSyncGithubApps to import. + +--- + +###### `importFromId`Required + +- *Type:* string + +The id of the existing SecretsSyncGithubApps that should be imported. + +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#import import section} in the documentation of this resource for the id to use + +--- + +###### `provider`Optional + +- *Type:* cdktf.TerraformProvider + +? Optional instance of the provider where the SecretsSyncGithubApps to import is found. + +--- + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| node | constructs.Node | The tree node. | +| cdktfStack | cdktf.TerraformStack | *No description.* | +| fqn | string | *No description.* | +| friendlyUniqueId | string | *No description.* | +| terraformMetaArguments | {[ key: string ]: any} | *No description.* | +| terraformResourceType | string | *No description.* | +| terraformGeneratorMetadata | cdktf.TerraformProviderGeneratorMetadata | *No description.* | +| connection | cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection | *No description.* | +| count | number \| cdktf.TerraformCount | *No description.* | +| dependsOn | string[] | *No description.* | +| forEach | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | +| fingerprint | string | *No description.* | +| appIdInput | number | *No description.* | +| idInput | string | *No description.* | +| nameInput | string | *No description.* | +| namespaceInput | string | *No description.* | +| privateKeyInput | string | *No description.* | +| appId | number | *No description.* | +| id | string | *No description.* | +| name | string | *No description.* | +| namespace | string | *No description.* | +| privateKey | string | *No description.* | + +--- + +##### `node`Required + +```typescript +public readonly node: Node; +``` + +- *Type:* constructs.Node + +The tree node. + +--- + +##### `cdktfStack`Required + +```typescript +public readonly cdktfStack: TerraformStack; +``` + +- *Type:* cdktf.TerraformStack + +--- + +##### `fqn`Required + +```typescript +public readonly fqn: string; +``` + +- *Type:* string + +--- + +##### `friendlyUniqueId`Required + +```typescript +public readonly friendlyUniqueId: string; +``` + +- *Type:* string + +--- + +##### `terraformMetaArguments`Required + +```typescript +public readonly terraformMetaArguments: {[ key: string ]: any}; +``` + +- *Type:* {[ key: string ]: any} + +--- + +##### `terraformResourceType`Required + +```typescript +public readonly terraformResourceType: string; +``` + +- *Type:* string + +--- + +##### `terraformGeneratorMetadata`Optional + +```typescript +public readonly terraformGeneratorMetadata: TerraformProviderGeneratorMetadata; +``` + +- *Type:* cdktf.TerraformProviderGeneratorMetadata + +--- + +##### `connection`Optional + +```typescript +public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection; +``` + +- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```typescript +public readonly count: number | TerraformCount; +``` + +- *Type:* number | cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +```typescript +public readonly dependsOn: string[]; +``` + +- *Type:* string[] + +--- + +##### `forEach`Optional + +```typescript +public readonly forEach: ITerraformIterator; +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```typescript +public readonly lifecycle: TerraformResourceLifecycle; +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```typescript +public readonly provider: TerraformProvider; +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```typescript +public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[]; +``` + +- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[] + +--- + +##### `fingerprint`Required + +```typescript +public readonly fingerprint: string; +``` + +- *Type:* string + +--- + +##### `appIdInput`Optional + +```typescript +public readonly appIdInput: number; +``` + +- *Type:* number + +--- + +##### `idInput`Optional + +```typescript +public readonly idInput: string; +``` + +- *Type:* string + +--- + +##### `nameInput`Optional + +```typescript +public readonly nameInput: string; +``` + +- *Type:* string + +--- + +##### `namespaceInput`Optional + +```typescript +public readonly namespaceInput: string; +``` + +- *Type:* string + +--- + +##### `privateKeyInput`Optional + +```typescript +public readonly privateKeyInput: string; +``` + +- *Type:* string + +--- + +##### `appId`Required + +```typescript +public readonly appId: number; +``` + +- *Type:* number + +--- + +##### `id`Required + +```typescript +public readonly id: string; +``` + +- *Type:* string + +--- + +##### `name`Required + +```typescript +public readonly name: string; +``` + +- *Type:* string + +--- + +##### `namespace`Required + +```typescript +public readonly namespace: string; +``` + +- *Type:* string + +--- + +##### `privateKey`Required + +```typescript +public readonly privateKey: string; +``` + +- *Type:* string + +--- + +#### Constants + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| tfResourceType | string | *No description.* | + +--- + +##### `tfResourceType`Required + +```typescript +public readonly tfResourceType: string; +``` + +- *Type:* string + +--- + +## Structs + +### SecretsSyncGithubAppsConfig + +#### Initializer + +```typescript +import { secretsSyncGithubApps } from '@cdktf/provider-vault' + +const secretsSyncGithubAppsConfig: secretsSyncGithubApps.SecretsSyncGithubAppsConfig = { ... } +``` + +#### Properties + +| **Name** | **Type** | **Description** | +| --- | --- | --- | +| connection | cdktf.SSHProvisionerConnection \| cdktf.WinrmProvisionerConnection | *No description.* | +| count | number \| cdktf.TerraformCount | *No description.* | +| dependsOn | cdktf.ITerraformDependable[] | *No description.* | +| forEach | cdktf.ITerraformIterator | *No description.* | +| lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | +| provider | cdktf.TerraformProvider | *No description.* | +| provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | +| appId | number | The GitHub application ID. | +| name | string | The user-defined name of the GitHub App configuration. | +| privateKey | string | The content of a PEM formatted private key generated on GitHub for the app. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. | +| namespace | string | Target namespace. (requires Enterprise). | + +--- + +##### `connection`Optional + +```typescript +public readonly connection: SSHProvisionerConnection | WinrmProvisionerConnection; +``` + +- *Type:* cdktf.SSHProvisionerConnection | cdktf.WinrmProvisionerConnection + +--- + +##### `count`Optional + +```typescript +public readonly count: number | TerraformCount; +``` + +- *Type:* number | cdktf.TerraformCount + +--- + +##### `dependsOn`Optional + +```typescript +public readonly dependsOn: ITerraformDependable[]; +``` + +- *Type:* cdktf.ITerraformDependable[] + +--- + +##### `forEach`Optional + +```typescript +public readonly forEach: ITerraformIterator; +``` + +- *Type:* cdktf.ITerraformIterator + +--- + +##### `lifecycle`Optional + +```typescript +public readonly lifecycle: TerraformResourceLifecycle; +``` + +- *Type:* cdktf.TerraformResourceLifecycle + +--- + +##### `provider`Optional + +```typescript +public readonly provider: TerraformProvider; +``` + +- *Type:* cdktf.TerraformProvider + +--- + +##### `provisioners`Optional + +```typescript +public readonly provisioners: FileProvisioner | LocalExecProvisioner | RemoteExecProvisioner[]; +``` + +- *Type:* cdktf.FileProvisioner | cdktf.LocalExecProvisioner | cdktf.RemoteExecProvisioner[] + +--- + +##### `appId`Required + +```typescript +public readonly appId: number; +``` + +- *Type:* number + +The GitHub application ID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#app_id SecretsSyncGithubApps#app_id} + +--- + +##### `name`Required + +```typescript +public readonly name: string; +``` + +- *Type:* string + +The user-defined name of the GitHub App configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#name SecretsSyncGithubApps#name} + +--- + +##### `privateKey`Required + +```typescript +public readonly privateKey: string; +``` + +- *Type:* string + +The content of a PEM formatted private key generated on GitHub for the app. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#private_key SecretsSyncGithubApps#private_key} + +--- + +##### `id`Optional + +```typescript +public readonly id: string; +``` + +- *Type:* string + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id}. + +Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. +If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + +--- + +##### `namespace`Optional + +```typescript +public readonly namespace: string; +``` + +- *Type:* string + +Target namespace. (requires Enterprise). + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#namespace SecretsSyncGithubApps#namespace} + +--- + + + diff --git a/docs/secretsSyncVercelDestination.csharp.md b/docs/secretsSyncVercelDestination.csharp.md index e0447be9..51ad2b7a 100644 --- a/docs/secretsSyncVercelDestination.csharp.md +++ b/docs/secretsSyncVercelDestination.csharp.md @@ -4,7 +4,7 @@ ### SecretsSyncVercelDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the SecretsSyncVercelDestinati The id of the existing SecretsSyncVercelDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use --- @@ -918,7 +918,7 @@ new SecretsSyncVercelDestinationConfig { | DeploymentEnvironments | string[] | Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. | | Name | string | Unique name of the Vercel destination. | | ProjectId | string | Project ID where to manage environment variables. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretNameTemplate | string | Template describing how to generate external secret names. | | TeamId | string | Team ID the project belongs to. | @@ -1005,7 +1005,7 @@ public string AccessToken { get; set; } Vercel API access token with the permissions to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} --- @@ -1019,7 +1019,7 @@ public string[] DeploymentEnvironments { get; set; } Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} --- @@ -1033,7 +1033,7 @@ public string Name { get; set; } Unique name of the Vercel destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} --- @@ -1047,7 +1047,7 @@ public string ProjectId { get; set; } Project ID where to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} --- @@ -1059,7 +1059,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} --- @@ -1090,7 +1090,7 @@ public string SecretNameTemplate { get; set; } Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} --- @@ -1104,7 +1104,7 @@ public string TeamId { get; set; } Team ID the project belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} --- diff --git a/docs/secretsSyncVercelDestination.go.md b/docs/secretsSyncVercelDestination.go.md index 82549de1..d4a536db 100644 --- a/docs/secretsSyncVercelDestination.go.md +++ b/docs/secretsSyncVercelDestination.go.md @@ -4,12 +4,12 @@ ### SecretsSyncVercelDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncverceldestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncverceldestination" secretssyncverceldestination.NewSecretsSyncVercelDestination(scope Construct, id *string, config SecretsSyncVercelDestinationConfig) SecretsSyncVercelDestination ``` @@ -406,7 +406,7 @@ func ResetTeamId() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncverceldestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncverceldestination" secretssyncverceldestination.SecretsSyncVercelDestination_IsConstruct(x interface{}) *bool ``` @@ -438,7 +438,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncverceldestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncverceldestination" secretssyncverceldestination.SecretsSyncVercelDestination_IsTerraformElement(x interface{}) *bool ``` @@ -452,7 +452,7 @@ secretssyncverceldestination.SecretsSyncVercelDestination_IsTerraformElement(x i ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncverceldestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncverceldestination" secretssyncverceldestination.SecretsSyncVercelDestination_IsTerraformResource(x interface{}) *bool ``` @@ -466,7 +466,7 @@ secretssyncverceldestination.SecretsSyncVercelDestination_IsTerraformResource(x ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncverceldestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncverceldestination" secretssyncverceldestination.SecretsSyncVercelDestination_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -495,7 +495,7 @@ The construct id used in the generated config for the SecretsSyncVercelDestinati The id of the existing SecretsSyncVercelDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use --- @@ -882,7 +882,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncverceldestination" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/secretssyncverceldestination" &secretssyncverceldestination.SecretsSyncVercelDestinationConfig { Connection: interface{}, @@ -918,7 +918,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/secretssyncverceldest | DeploymentEnvironments | *[]*string | Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. | | Name | *string | Unique name of the Vercel destination. | | ProjectId | *string | Project ID where to manage environment variables. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretNameTemplate | *string | Template describing how to generate external secret names. | | TeamId | *string | Team ID the project belongs to. | @@ -1005,7 +1005,7 @@ AccessToken *string Vercel API access token with the permissions to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} --- @@ -1019,7 +1019,7 @@ DeploymentEnvironments *[]*string Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} --- @@ -1033,7 +1033,7 @@ Name *string Unique name of the Vercel destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} --- @@ -1047,7 +1047,7 @@ ProjectId *string Project ID where to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} --- @@ -1059,7 +1059,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} --- @@ -1090,7 +1090,7 @@ SecretNameTemplate *string Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} --- @@ -1104,7 +1104,7 @@ TeamId *string Team ID the project belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} --- diff --git a/docs/secretsSyncVercelDestination.java.md b/docs/secretsSyncVercelDestination.java.md index cf0c0de5..fba3f71a 100644 --- a/docs/secretsSyncVercelDestination.java.md +++ b/docs/secretsSyncVercelDestination.java.md @@ -4,7 +4,7 @@ ### SecretsSyncVercelDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. #### Initializers @@ -49,7 +49,7 @@ SecretsSyncVercelDestination.Builder.create(Construct scope, java.lang.String id | deploymentEnvironments | java.util.List | Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. | | name | java.lang.String | Unique name of the Vercel destination. | | projectId | java.lang.String | Project ID where to manage environment variables. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretNameTemplate | java.lang.String | Template describing how to generate external secret names. | | teamId | java.lang.String | Team ID the project belongs to. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Vercel API access token with the permissions to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the Vercel destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Project ID where to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Team ID the project belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} --- @@ -648,7 +648,7 @@ The construct id used in the generated config for the SecretsSyncVercelDestinati The id of the existing SecretsSyncVercelDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use --- @@ -1075,7 +1075,7 @@ SecretsSyncVercelDestinationConfig.builder() | deploymentEnvironments | java.util.List | Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. | | name | java.lang.String | Unique name of the Vercel destination. | | projectId | java.lang.String | Project ID where to manage environment variables. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretNameTemplate | java.lang.String | Template describing how to generate external secret names. | | teamId | java.lang.String | Team ID the project belongs to. | @@ -1162,7 +1162,7 @@ public java.lang.String getAccessToken(); Vercel API access token with the permissions to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} --- @@ -1176,7 +1176,7 @@ public java.util.List getDeploymentEnvironments(); Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} --- @@ -1190,7 +1190,7 @@ public java.lang.String getName(); Unique name of the Vercel destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} --- @@ -1204,7 +1204,7 @@ public java.lang.String getProjectId(); Project ID where to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} --- @@ -1216,7 +1216,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1233,7 +1233,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} --- @@ -1247,7 +1247,7 @@ public java.lang.String getSecretNameTemplate(); Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} --- @@ -1261,7 +1261,7 @@ public java.lang.String getTeamId(); Team ID the project belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} --- diff --git a/docs/secretsSyncVercelDestination.python.md b/docs/secretsSyncVercelDestination.python.md index c65bbc81..d9b74a1a 100644 --- a/docs/secretsSyncVercelDestination.python.md +++ b/docs/secretsSyncVercelDestination.python.md @@ -4,7 +4,7 @@ ### SecretsSyncVercelDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. #### Initializers @@ -47,7 +47,7 @@ secretsSyncVercelDestination.SecretsSyncVercelDestination( | deployment_environments | typing.List[str] | Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. | | name | str | Unique name of the Vercel destination. | | project_id | str | Project ID where to manage environment variables. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_name_template | str | Template describing how to generate external secret names. | | team_id | str | Team ID the project belongs to. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Vercel API access token with the permissions to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the Vercel destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Project ID where to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Team ID the project belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} --- @@ -692,7 +692,7 @@ The construct id used in the generated config for the SecretsSyncVercelDestinati The id of the existing SecretsSyncVercelDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use --- @@ -1115,7 +1115,7 @@ secretsSyncVercelDestination.SecretsSyncVercelDestinationConfig( | deployment_environments | typing.List[str] | Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. | | name | str | Unique name of the Vercel destination. | | project_id | str | Project ID where to manage environment variables. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_name_template | str | Template describing how to generate external secret names. | | team_id | str | Team ID the project belongs to. | @@ -1202,7 +1202,7 @@ access_token: str Vercel API access token with the permissions to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} --- @@ -1216,7 +1216,7 @@ deployment_environments: typing.List[str] Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} --- @@ -1230,7 +1230,7 @@ name: str Unique name of the Vercel destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} --- @@ -1244,7 +1244,7 @@ project_id: str Project ID where to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} --- @@ -1256,7 +1256,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1273,7 +1273,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} --- @@ -1287,7 +1287,7 @@ secret_name_template: str Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} --- @@ -1301,7 +1301,7 @@ team_id: str Team ID the project belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} --- diff --git a/docs/secretsSyncVercelDestination.typescript.md b/docs/secretsSyncVercelDestination.typescript.md index ca0dce2d..b344ba1d 100644 --- a/docs/secretsSyncVercelDestination.typescript.md +++ b/docs/secretsSyncVercelDestination.typescript.md @@ -4,7 +4,7 @@ ### SecretsSyncVercelDestination -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the SecretsSyncVercelDestinati The id of the existing SecretsSyncVercelDestination that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use --- @@ -902,7 +902,7 @@ const secretsSyncVercelDestinationConfig: secretsSyncVercelDestination.SecretsSy | deploymentEnvironments | string[] | Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. | | name | string | Unique name of the Vercel destination. | | projectId | string | Project ID where to manage environment variables. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. | | namespace | string | Target namespace. (requires Enterprise). | | secretNameTemplate | string | Template describing how to generate external secret names. | | teamId | string | Team ID the project belongs to. | @@ -989,7 +989,7 @@ public readonly accessToken: string; Vercel API access token with the permissions to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} --- @@ -1003,7 +1003,7 @@ public readonly deploymentEnvironments: string[]; Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} --- @@ -1017,7 +1017,7 @@ public readonly name: string; Unique name of the Vercel destination. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} --- @@ -1031,7 +1031,7 @@ public readonly projectId: string; Project ID where to manage environment variables. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} --- @@ -1043,7 +1043,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1060,7 +1060,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} --- @@ -1074,7 +1074,7 @@ public readonly secretNameTemplate: string; Template describing how to generate external secret names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} --- @@ -1088,7 +1088,7 @@ public readonly teamId: string; Team ID the project belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} --- diff --git a/docs/sshSecretBackendCa.csharp.md b/docs/sshSecretBackendCa.csharp.md index b9433fa0..1bbd9580 100644 --- a/docs/sshSecretBackendCa.csharp.md +++ b/docs/sshSecretBackendCa.csharp.md @@ -4,7 +4,7 @@ ### SshSecretBackendCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the SshSecretBackendCa to impo The id of the existing SshSecretBackendCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use --- @@ -873,7 +873,7 @@ new SshSecretBackendCaConfig { | Provisioners | object[] | *No description.* | | Backend | string | The path of the SSH Secret Backend where the CA should be configured. | | GenerateSigningKey | object | Whether Vault should generate the signing key pair internally. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | PrivateKey | string | Private key part the SSH CA key pair; required if generate_signing_key is false. | | PublicKey | string | Public key part the SSH CA key pair; required if generate_signing_key is false. | @@ -960,7 +960,7 @@ public string Backend { get; set; } The path of the SSH Secret Backend where the CA should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} --- @@ -974,7 +974,7 @@ public object GenerateSigningKey { get; set; } Whether Vault should generate the signing key pair internally. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} --- @@ -986,7 +986,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} --- @@ -1017,7 +1017,7 @@ public string PrivateKey { get; set; } Private key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} --- @@ -1031,7 +1031,7 @@ public string PublicKey { get; set; } Public key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} --- diff --git a/docs/sshSecretBackendCa.go.md b/docs/sshSecretBackendCa.go.md index dac5e0fa..769dc7c0 100644 --- a/docs/sshSecretBackendCa.go.md +++ b/docs/sshSecretBackendCa.go.md @@ -4,12 +4,12 @@ ### SshSecretBackendCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendca" sshsecretbackendca.NewSshSecretBackendCa(scope Construct, id *string, config SshSecretBackendCaConfig) SshSecretBackendCa ``` @@ -420,7 +420,7 @@ func ResetPublicKey() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendca" sshsecretbackendca.SshSecretBackendCa_IsConstruct(x interface{}) *bool ``` @@ -452,7 +452,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendca" sshsecretbackendca.SshSecretBackendCa_IsTerraformElement(x interface{}) *bool ``` @@ -466,7 +466,7 @@ sshsecretbackendca.SshSecretBackendCa_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendca" sshsecretbackendca.SshSecretBackendCa_IsTerraformResource(x interface{}) *bool ``` @@ -480,7 +480,7 @@ sshsecretbackendca.SshSecretBackendCa_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendca" sshsecretbackendca.SshSecretBackendCa_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -509,7 +509,7 @@ The construct id used in the generated config for the SshSecretBackendCa to impo The id of the existing SshSecretBackendCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use --- @@ -841,7 +841,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendca" &sshsecretbackendca.SshSecretBackendCaConfig { Connection: interface{}, @@ -873,7 +873,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendca" | Provisioners | *[]interface{} | *No description.* | | Backend | *string | The path of the SSH Secret Backend where the CA should be configured. | | GenerateSigningKey | interface{} | Whether Vault should generate the signing key pair internally. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | PrivateKey | *string | Private key part the SSH CA key pair; required if generate_signing_key is false. | | PublicKey | *string | Public key part the SSH CA key pair; required if generate_signing_key is false. | @@ -960,7 +960,7 @@ Backend *string The path of the SSH Secret Backend where the CA should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} --- @@ -974,7 +974,7 @@ GenerateSigningKey interface{} Whether Vault should generate the signing key pair internally. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} --- @@ -986,7 +986,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} --- @@ -1017,7 +1017,7 @@ PrivateKey *string Private key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} --- @@ -1031,7 +1031,7 @@ PublicKey *string Public key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} --- diff --git a/docs/sshSecretBackendCa.java.md b/docs/sshSecretBackendCa.java.md index 0408581d..a506e912 100644 --- a/docs/sshSecretBackendCa.java.md +++ b/docs/sshSecretBackendCa.java.md @@ -4,7 +4,7 @@ ### SshSecretBackendCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. #### Initializers @@ -46,7 +46,7 @@ SshSecretBackendCa.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The path of the SSH Secret Backend where the CA should be configured. | | generateSigningKey | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether Vault should generate the signing key pair internally. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | privateKey | java.lang.String | Private key part the SSH CA key pair; required if generate_signing_key is false. | | publicKey | java.lang.String | Public key part the SSH CA key pair; required if generate_signing_key is false. | @@ -119,7 +119,7 @@ Must be unique amongst siblings in the same scope The path of the SSH Secret Backend where the CA should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} --- @@ -129,7 +129,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether Vault should generate the signing key pair internally. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -150,7 +150,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Private key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Public key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} --- @@ -639,7 +639,7 @@ The construct id used in the generated config for the SshSecretBackendCa to impo The id of the existing SshSecretBackendCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use --- @@ -1008,7 +1008,7 @@ SshSecretBackendCaConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The path of the SSH Secret Backend where the CA should be configured. | | generateSigningKey | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether Vault should generate the signing key pair internally. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | privateKey | java.lang.String | Private key part the SSH CA key pair; required if generate_signing_key is false. | | publicKey | java.lang.String | Public key part the SSH CA key pair; required if generate_signing_key is false. | @@ -1095,7 +1095,7 @@ public java.lang.String getBackend(); The path of the SSH Secret Backend where the CA should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} --- @@ -1109,7 +1109,7 @@ public java.lang.Object getGenerateSigningKey(); Whether Vault should generate the signing key pair internally. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} --- @@ -1121,7 +1121,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1138,7 +1138,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} --- @@ -1152,7 +1152,7 @@ public java.lang.String getPrivateKey(); Private key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} --- @@ -1166,7 +1166,7 @@ public java.lang.String getPublicKey(); Public key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} --- diff --git a/docs/sshSecretBackendCa.python.md b/docs/sshSecretBackendCa.python.md index 870512a0..878ecfe2 100644 --- a/docs/sshSecretBackendCa.python.md +++ b/docs/sshSecretBackendCa.python.md @@ -4,7 +4,7 @@ ### SshSecretBackendCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. #### Initializers @@ -43,7 +43,7 @@ sshSecretBackendCa.SshSecretBackendCa( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The path of the SSH Secret Backend where the CA should be configured. | | generate_signing_key | typing.Union[bool, cdktf.IResolvable] | Whether Vault should generate the signing key pair internally. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | | namespace | str | Target namespace. (requires Enterprise). | | private_key | str | Private key part the SSH CA key pair; required if generate_signing_key is false. | | public_key | str | Public key part the SSH CA key pair; required if generate_signing_key is false. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The path of the SSH Secret Backend where the CA should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether Vault should generate the signing key pair internally. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Private key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Public key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} --- @@ -682,7 +682,7 @@ The construct id used in the generated config for the SshSecretBackendCa to impo The id of the existing SshSecretBackendCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use --- @@ -1046,7 +1046,7 @@ sshSecretBackendCa.SshSecretBackendCaConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The path of the SSH Secret Backend where the CA should be configured. | | generate_signing_key | typing.Union[bool, cdktf.IResolvable] | Whether Vault should generate the signing key pair internally. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | | namespace | str | Target namespace. (requires Enterprise). | | private_key | str | Private key part the SSH CA key pair; required if generate_signing_key is false. | | public_key | str | Public key part the SSH CA key pair; required if generate_signing_key is false. | @@ -1133,7 +1133,7 @@ backend: str The path of the SSH Secret Backend where the CA should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} --- @@ -1147,7 +1147,7 @@ generate_signing_key: typing.Union[bool, IResolvable] Whether Vault should generate the signing key pair internally. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} --- @@ -1159,7 +1159,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1176,7 +1176,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} --- @@ -1190,7 +1190,7 @@ private_key: str Private key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} --- @@ -1204,7 +1204,7 @@ public_key: str Public key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} --- diff --git a/docs/sshSecretBackendCa.typescript.md b/docs/sshSecretBackendCa.typescript.md index c8750407..c2ec7f2b 100644 --- a/docs/sshSecretBackendCa.typescript.md +++ b/docs/sshSecretBackendCa.typescript.md @@ -4,7 +4,7 @@ ### SshSecretBackendCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the SshSecretBackendCa to impo The id of the existing SshSecretBackendCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use --- @@ -859,7 +859,7 @@ const sshSecretBackendCaConfig: sshSecretBackendCa.SshSecretBackendCaConfig = { | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | The path of the SSH Secret Backend where the CA should be configured. | | generateSigningKey | boolean \| cdktf.IResolvable | Whether Vault should generate the signing key pair internally. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. | | namespace | string | Target namespace. (requires Enterprise). | | privateKey | string | Private key part the SSH CA key pair; required if generate_signing_key is false. | | publicKey | string | Public key part the SSH CA key pair; required if generate_signing_key is false. | @@ -946,7 +946,7 @@ public readonly backend: string; The path of the SSH Secret Backend where the CA should be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} --- @@ -960,7 +960,7 @@ public readonly generateSigningKey: boolean | IResolvable; Whether Vault should generate the signing key pair internally. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} --- @@ -972,7 +972,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} --- @@ -1003,7 +1003,7 @@ public readonly privateKey: string; Private key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} --- @@ -1017,7 +1017,7 @@ public readonly publicKey: string; Public key part the SSH CA key pair; required if generate_signing_key is false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} --- diff --git a/docs/sshSecretBackendRole.csharp.md b/docs/sshSecretBackendRole.csharp.md index 54b67124..25c59c4c 100644 --- a/docs/sshSecretBackendRole.csharp.md +++ b/docs/sshSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### SshSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. #### Initializers @@ -81,7 +81,6 @@ Must be unique amongst siblings in the same scope | ResetAllowedDomainsTemplate | *No description.* | | ResetAllowedExtensions | *No description.* | | ResetAllowedUserKeyConfig | *No description.* | -| ResetAllowedUserKeyLengths | *No description.* | | ResetAllowedUsers | *No description.* | | ResetAllowedUsersTemplate | *No description.* | | ResetAllowHostCertificates | *No description.* | @@ -444,12 +443,6 @@ private void ResetAllowedExtensions() private void ResetAllowedUserKeyConfig() ``` -##### `ResetAllowedUserKeyLengths` - -```csharp -private void ResetAllowedUserKeyLengths() -``` - ##### `ResetAllowedUsers` ```csharp @@ -655,7 +648,7 @@ The construct id used in the generated config for the SshSecretBackendRole to im The id of the existing SshSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -693,7 +686,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | AllowedDomainsTemplateInput | object | *No description.* | | AllowedExtensionsInput | string | *No description.* | | AllowedUserKeyConfigInput | object | *No description.* | -| AllowedUserKeyLengthsInput | System.Collections.Generic.IDictionary | *No description.* | | AllowedUsersInput | string | *No description.* | | AllowedUsersTemplateInput | object | *No description.* | | AllowHostCertificatesInput | object | *No description.* | @@ -720,7 +712,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | AllowedDomains | string | *No description.* | | AllowedDomainsTemplate | object | *No description.* | | AllowedExtensions | string | *No description.* | -| AllowedUserKeyLengths | System.Collections.Generic.IDictionary | *No description.* | | AllowedUsers | string | *No description.* | | AllowedUsersTemplate | object | *No description.* | | AllowHostCertificates | object | *No description.* | @@ -966,16 +957,6 @@ public object AllowedUserKeyConfigInput { get; } --- -##### `AllowedUserKeyLengthsInput`Optional - -```csharp -public System.Collections.Generic.IDictionary AllowedUserKeyLengthsInput { get; } -``` - -- *Type:* System.Collections.Generic.IDictionary - ---- - ##### `AllowedUsersInput`Optional ```csharp @@ -1236,16 +1217,6 @@ public string AllowedExtensions { get; } --- -##### `AllowedUserKeyLengths`Required - -```csharp -public System.Collections.Generic.IDictionary AllowedUserKeyLengths { get; } -``` - -- *Type:* System.Collections.Generic.IDictionary - ---- - ##### `AllowedUsers`Required ```csharp @@ -1498,7 +1469,7 @@ public double[] Lengths { get; set; } List of allowed key lengths, vault-1.10 and above. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} --- @@ -1512,7 +1483,7 @@ public string Type { get; set; } Key type, choices: rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} --- @@ -1541,7 +1512,6 @@ new SshSecretBackendRoleConfig { object AllowedDomainsTemplate = null, string AllowedExtensions = null, object AllowedUserKeyConfig = null, - System.Collections.Generic.IDictionary AllowedUserKeyLengths = null, string AllowedUsers = null, object AllowedUsersTemplate = null, object AllowHostCertificates = null, @@ -1573,34 +1543,33 @@ new SshSecretBackendRoleConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | -| KeyType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | +| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | +| KeyType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | | Name | string | Unique name for the role. | -| AlgorithmSigner | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | -| AllowBareDomains | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | -| AllowedCriticalOptions | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | -| AllowedDomains | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | -| AllowedDomainsTemplate | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | -| AllowedExtensions | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | +| AlgorithmSigner | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | +| AllowBareDomains | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | +| AllowedCriticalOptions | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | +| AllowedDomains | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | +| AllowedDomainsTemplate | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | +| AllowedExtensions | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | | AllowedUserKeyConfig | object | allowed_user_key_config block. | -| AllowedUserKeyLengths | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. | -| AllowedUsers | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | -| AllowedUsersTemplate | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | -| AllowHostCertificates | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | -| AllowSubdomains | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | -| AllowUserCertificates | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | -| AllowUserKeyIds | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | -| CidrList | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | -| DefaultCriticalOptions | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | -| DefaultExtensions | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | -| DefaultUser | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | -| DefaultUserTemplate | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | -| KeyIdFormat | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | -| MaxTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | +| AllowedUsers | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | +| AllowedUsersTemplate | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | +| AllowHostCertificates | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | +| AllowSubdomains | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | +| AllowUserCertificates | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | +| AllowUserKeyIds | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | +| CidrList | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | +| DefaultCriticalOptions | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | +| DefaultExtensions | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | +| DefaultUser | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | +| DefaultUserTemplate | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | +| KeyIdFormat | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | +| MaxTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | | Namespace | string | Target namespace. (requires Enterprise). | | NotBeforeDuration | string | Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. | -| Ttl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | +| Ttl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | --- @@ -1682,7 +1651,7 @@ public string Backend { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. --- @@ -1694,7 +1663,7 @@ public string KeyType { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. --- @@ -1708,7 +1677,7 @@ public string Name { get; set; } Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} --- @@ -1720,7 +1689,7 @@ public string AlgorithmSigner { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. --- @@ -1732,7 +1701,7 @@ public object AllowBareDomains { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. --- @@ -1744,7 +1713,7 @@ public string AllowedCriticalOptions { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. --- @@ -1756,7 +1725,7 @@ public string AllowedDomains { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. --- @@ -1768,7 +1737,7 @@ public object AllowedDomainsTemplate { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. --- @@ -1780,7 +1749,7 @@ public string AllowedExtensions { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. --- @@ -1794,19 +1763,7 @@ public object AllowedUserKeyConfig { get; set; } allowed_user_key_config block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} - ---- - -##### `AllowedUserKeyLengths`Optional - -```csharp -public System.Collections.Generic.IDictionary AllowedUserKeyLengths { get; set; } -``` - -- *Type:* System.Collections.Generic.IDictionary - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} --- @@ -1818,7 +1775,7 @@ public string AllowedUsers { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. --- @@ -1830,7 +1787,7 @@ public object AllowedUsersTemplate { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. --- @@ -1842,7 +1799,7 @@ public object AllowHostCertificates { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. --- @@ -1854,7 +1811,7 @@ public object AllowSubdomains { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. --- @@ -1866,7 +1823,7 @@ public object AllowUserCertificates { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. --- @@ -1878,7 +1835,7 @@ public object AllowUserKeyIds { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. --- @@ -1890,7 +1847,7 @@ public string CidrList { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. --- @@ -1902,7 +1859,7 @@ public System.Collections.Generic.IDictionary DefaultCriticalOpt - *Type:* System.Collections.Generic.IDictionary -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. --- @@ -1914,7 +1871,7 @@ public System.Collections.Generic.IDictionary DefaultExtensions - *Type:* System.Collections.Generic.IDictionary -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. --- @@ -1926,7 +1883,7 @@ public string DefaultUser { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. --- @@ -1938,7 +1895,7 @@ public object DefaultUserTemplate { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. --- @@ -1950,7 +1907,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1965,7 +1922,7 @@ public string KeyIdFormat { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. --- @@ -1977,7 +1934,7 @@ public string MaxTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. --- @@ -1991,7 +1948,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} --- @@ -2005,7 +1962,7 @@ public string NotBeforeDuration { get; set; } Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} --- @@ -2017,7 +1974,7 @@ public string Ttl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. --- diff --git a/docs/sshSecretBackendRole.go.md b/docs/sshSecretBackendRole.go.md index 6968d496..5bf51dae 100644 --- a/docs/sshSecretBackendRole.go.md +++ b/docs/sshSecretBackendRole.go.md @@ -4,12 +4,12 @@ ### SshSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendrole" sshsecretbackendrole.NewSshSecretBackendRole(scope Construct, id *string, config SshSecretBackendRoleConfig) SshSecretBackendRole ``` @@ -81,7 +81,6 @@ Must be unique amongst siblings in the same scope | ResetAllowedDomainsTemplate | *No description.* | | ResetAllowedExtensions | *No description.* | | ResetAllowedUserKeyConfig | *No description.* | -| ResetAllowedUserKeyLengths | *No description.* | | ResetAllowedUsers | *No description.* | | ResetAllowedUsersTemplate | *No description.* | | ResetAllowHostCertificates | *No description.* | @@ -444,12 +443,6 @@ func ResetAllowedExtensions() func ResetAllowedUserKeyConfig() ``` -##### `ResetAllowedUserKeyLengths` - -```go -func ResetAllowedUserKeyLengths() -``` - ##### `ResetAllowedUsers` ```go @@ -566,7 +559,7 @@ func ResetTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendrole" sshsecretbackendrole.SshSecretBackendRole_IsConstruct(x interface{}) *bool ``` @@ -598,7 +591,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendrole" sshsecretbackendrole.SshSecretBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -612,7 +605,7 @@ sshsecretbackendrole.SshSecretBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendrole" sshsecretbackendrole.SshSecretBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -626,7 +619,7 @@ sshsecretbackendrole.SshSecretBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendrole" sshsecretbackendrole.SshSecretBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -655,7 +648,7 @@ The construct id used in the generated config for the SshSecretBackendRole to im The id of the existing SshSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -693,7 +686,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | AllowedDomainsTemplateInput | interface{} | *No description.* | | AllowedExtensionsInput | *string | *No description.* | | AllowedUserKeyConfigInput | interface{} | *No description.* | -| AllowedUserKeyLengthsInput | *map[string]*f64 | *No description.* | | AllowedUsersInput | *string | *No description.* | | AllowedUsersTemplateInput | interface{} | *No description.* | | AllowHostCertificatesInput | interface{} | *No description.* | @@ -720,7 +712,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | AllowedDomains | *string | *No description.* | | AllowedDomainsTemplate | interface{} | *No description.* | | AllowedExtensions | *string | *No description.* | -| AllowedUserKeyLengths | *map[string]*f64 | *No description.* | | AllowedUsers | *string | *No description.* | | AllowedUsersTemplate | interface{} | *No description.* | | AllowHostCertificates | interface{} | *No description.* | @@ -966,16 +957,6 @@ func AllowedUserKeyConfigInput() interface{} --- -##### `AllowedUserKeyLengthsInput`Optional - -```go -func AllowedUserKeyLengthsInput() *map[string]*f64 -``` - -- *Type:* *map[string]*f64 - ---- - ##### `AllowedUsersInput`Optional ```go @@ -1236,16 +1217,6 @@ func AllowedExtensions() *string --- -##### `AllowedUserKeyLengths`Required - -```go -func AllowedUserKeyLengths() *map[string]*f64 -``` - -- *Type:* *map[string]*f64 - ---- - ##### `AllowedUsers`Required ```go @@ -1471,7 +1442,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendrole" &sshsecretbackendrole.SshSecretBackendRoleAllowedUserKeyConfig { Lengths: *[]*f64, @@ -1498,7 +1469,7 @@ Lengths *[]*f64 List of allowed key lengths, vault-1.10 and above. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} --- @@ -1512,7 +1483,7 @@ Type *string Key type, choices: rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} --- @@ -1521,7 +1492,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendrole" &sshsecretbackendrole.SshSecretBackendRoleConfig { Connection: interface{}, @@ -1541,7 +1512,6 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" AllowedDomainsTemplate: interface{}, AllowedExtensions: *string, AllowedUserKeyConfig: interface{}, - AllowedUserKeyLengths: *map[string]*f64, AllowedUsers: *string, AllowedUsersTemplate: interface{}, AllowHostCertificates: interface{}, @@ -1573,34 +1543,33 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | -| KeyType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | +| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | +| KeyType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | | Name | *string | Unique name for the role. | -| AlgorithmSigner | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | -| AllowBareDomains | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | -| AllowedCriticalOptions | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | -| AllowedDomains | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | -| AllowedDomainsTemplate | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | -| AllowedExtensions | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | +| AlgorithmSigner | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | +| AllowBareDomains | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | +| AllowedCriticalOptions | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | +| AllowedDomains | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | +| AllowedDomainsTemplate | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | +| AllowedExtensions | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | | AllowedUserKeyConfig | interface{} | allowed_user_key_config block. | -| AllowedUserKeyLengths | *map[string]*f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. | -| AllowedUsers | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | -| AllowedUsersTemplate | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | -| AllowHostCertificates | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | -| AllowSubdomains | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | -| AllowUserCertificates | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | -| AllowUserKeyIds | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | -| CidrList | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | -| DefaultCriticalOptions | *map[string]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | -| DefaultExtensions | *map[string]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | -| DefaultUser | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | -| DefaultUserTemplate | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | -| KeyIdFormat | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | -| MaxTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | +| AllowedUsers | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | +| AllowedUsersTemplate | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | +| AllowHostCertificates | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | +| AllowSubdomains | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | +| AllowUserCertificates | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | +| AllowUserKeyIds | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | +| CidrList | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | +| DefaultCriticalOptions | *map[string]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | +| DefaultExtensions | *map[string]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | +| DefaultUser | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | +| DefaultUserTemplate | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | +| KeyIdFormat | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | +| MaxTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | | Namespace | *string | Target namespace. (requires Enterprise). | | NotBeforeDuration | *string | Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. | -| Ttl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | +| Ttl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | --- @@ -1682,7 +1651,7 @@ Backend *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. --- @@ -1694,7 +1663,7 @@ KeyType *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. --- @@ -1708,7 +1677,7 @@ Name *string Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} --- @@ -1720,7 +1689,7 @@ AlgorithmSigner *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. --- @@ -1732,7 +1701,7 @@ AllowBareDomains interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. --- @@ -1744,7 +1713,7 @@ AllowedCriticalOptions *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. --- @@ -1756,7 +1725,7 @@ AllowedDomains *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. --- @@ -1768,7 +1737,7 @@ AllowedDomainsTemplate interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. --- @@ -1780,7 +1749,7 @@ AllowedExtensions *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. --- @@ -1794,19 +1763,7 @@ AllowedUserKeyConfig interface{} allowed_user_key_config block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} - ---- - -##### `AllowedUserKeyLengths`Optional - -```go -AllowedUserKeyLengths *map[string]*f64 -``` - -- *Type:* *map[string]*f64 - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} --- @@ -1818,7 +1775,7 @@ AllowedUsers *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. --- @@ -1830,7 +1787,7 @@ AllowedUsersTemplate interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. --- @@ -1842,7 +1799,7 @@ AllowHostCertificates interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. --- @@ -1854,7 +1811,7 @@ AllowSubdomains interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. --- @@ -1866,7 +1823,7 @@ AllowUserCertificates interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. --- @@ -1878,7 +1835,7 @@ AllowUserKeyIds interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. --- @@ -1890,7 +1847,7 @@ CidrList *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. --- @@ -1902,7 +1859,7 @@ DefaultCriticalOptions *map[string]*string - *Type:* *map[string]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. --- @@ -1914,7 +1871,7 @@ DefaultExtensions *map[string]*string - *Type:* *map[string]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. --- @@ -1926,7 +1883,7 @@ DefaultUser *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. --- @@ -1938,7 +1895,7 @@ DefaultUserTemplate interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. --- @@ -1950,7 +1907,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1965,7 +1922,7 @@ KeyIdFormat *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. --- @@ -1977,7 +1934,7 @@ MaxTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. --- @@ -1991,7 +1948,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} --- @@ -2005,7 +1962,7 @@ NotBeforeDuration *string Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} --- @@ -2017,7 +1974,7 @@ Ttl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. --- @@ -2028,7 +1985,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendrole" sshsecretbackendrole.NewSshSecretBackendRoleAllowedUserKeyConfigList(terraformResource IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) SshSecretBackendRoleAllowedUserKeyConfigList ``` @@ -2188,7 +2145,7 @@ func InternalValue() interface{} #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/sshsecretbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/sshsecretbackendrole" sshsecretbackendrole.NewSshSecretBackendRoleAllowedUserKeyConfigOutputReference(terraformResource IInterpolatingParent, terraformAttribute *string, complexObjectIndex *f64, complexObjectIsFromSet *bool) SshSecretBackendRoleAllowedUserKeyConfigOutputReference ``` diff --git a/docs/sshSecretBackendRole.java.md b/docs/sshSecretBackendRole.java.md index 64d1bfd1..b137394a 100644 --- a/docs/sshSecretBackendRole.java.md +++ b/docs/sshSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### SshSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. #### Initializers @@ -36,7 +36,6 @@ SshSecretBackendRole.Builder.create(Construct scope, java.lang.String id) // .allowedExtensions(java.lang.String) // .allowedUserKeyConfig(IResolvable) // .allowedUserKeyConfig(java.util.List) -// .allowedUserKeyLengths(java.util.Map) // .allowedUsers(java.lang.String) // .allowedUsersTemplate(java.lang.Boolean) // .allowedUsersTemplate(IResolvable) @@ -74,34 +73,33 @@ SshSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | -| keyType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | +| keyType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | | name | java.lang.String | Unique name for the role. | -| algorithmSigner | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | -| allowBareDomains | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | -| allowedCriticalOptions | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | -| allowedDomains | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | -| allowedDomainsTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | -| allowedExtensions | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | +| algorithmSigner | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | +| allowBareDomains | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | +| allowedCriticalOptions | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | +| allowedDomains | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | +| allowedDomainsTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | +| allowedExtensions | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | | allowedUserKeyConfig | com.hashicorp.cdktf.IResolvable OR java.util.List<SshSecretBackendRoleAllowedUserKeyConfig> | allowed_user_key_config block. | -| allowedUserKeyLengths | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. | -| allowedUsers | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | -| allowedUsersTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | -| allowHostCertificates | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | -| allowSubdomains | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | -| allowUserCertificates | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | -| allowUserKeyIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | -| cidrList | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | -| defaultCriticalOptions | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | -| defaultExtensions | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | -| defaultUser | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | -| defaultUserTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | -| keyIdFormat | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | -| maxTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | +| allowedUsers | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | +| allowedUsersTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | +| allowHostCertificates | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | +| allowSubdomains | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | +| allowUserCertificates | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | +| allowUserKeyIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | +| cidrList | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | +| defaultCriticalOptions | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | +| defaultExtensions | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | +| defaultUser | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | +| defaultUserTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | +| keyIdFormat | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | +| maxTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | notBeforeDuration | java.lang.String | Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. | -| ttl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | +| ttl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | --- @@ -169,7 +167,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. --- @@ -177,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. --- @@ -187,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} --- @@ -195,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. --- @@ -203,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. --- @@ -211,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. --- @@ -219,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. --- @@ -227,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. --- @@ -235,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. --- @@ -245,15 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi allowed_user_key_config block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} - ---- - -##### `allowedUserKeyLengths`Optional - -- *Type:* java.util.Map - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} --- @@ -261,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. --- @@ -269,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. --- @@ -277,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. --- @@ -285,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. --- @@ -293,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. --- @@ -301,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. --- @@ -309,7 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. --- @@ -317,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.Map -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. --- @@ -325,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.Map -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. --- @@ -333,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. --- @@ -341,7 +331,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. --- @@ -349,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -360,7 +350,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. --- @@ -368,7 +358,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. --- @@ -378,7 +368,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} --- @@ -388,7 +378,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} --- @@ -396,7 +386,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. --- @@ -435,7 +425,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetAllowedDomainsTemplate | *No description.* | | resetAllowedExtensions | *No description.* | | resetAllowedUserKeyConfig | *No description.* | -| resetAllowedUserKeyLengths | *No description.* | | resetAllowedUsers | *No description.* | | resetAllowedUsersTemplate | *No description.* | | resetAllowHostCertificates | *No description.* | @@ -800,12 +789,6 @@ public void resetAllowedExtensions() public void resetAllowedUserKeyConfig() ``` -##### `resetAllowedUserKeyLengths` - -```java -public void resetAllowedUserKeyLengths() -``` - ##### `resetAllowedUsers` ```java @@ -1011,7 +994,7 @@ The construct id used in the generated config for the SshSecretBackendRole to im The id of the existing SshSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1049,7 +1032,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowedDomainsTemplateInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | allowedExtensionsInput | java.lang.String | *No description.* | | allowedUserKeyConfigInput | com.hashicorp.cdktf.IResolvable OR java.util.List<SshSecretBackendRoleAllowedUserKeyConfig> | *No description.* | -| allowedUserKeyLengthsInput | java.util.Map | *No description.* | | allowedUsersInput | java.lang.String | *No description.* | | allowedUsersTemplateInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | allowHostCertificatesInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -1076,7 +1058,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowedDomains | java.lang.String | *No description.* | | allowedDomainsTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | allowedExtensions | java.lang.String | *No description.* | -| allowedUserKeyLengths | java.util.Map | *No description.* | | allowedUsers | java.lang.String | *No description.* | | allowedUsersTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | allowHostCertificates | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -1322,16 +1303,6 @@ public java.lang.Object getAllowedUserKeyConfigInput(); --- -##### `allowedUserKeyLengthsInput`Optional - -```java -public java.util.Map getAllowedUserKeyLengthsInput(); -``` - -- *Type:* java.util.Map - ---- - ##### `allowedUsersInput`Optional ```java @@ -1592,16 +1563,6 @@ public java.lang.String getAllowedExtensions(); --- -##### `allowedUserKeyLengths`Required - -```java -public java.util.Map getAllowedUserKeyLengths(); -``` - -- *Type:* java.util.Map - ---- - ##### `allowedUsers`Required ```java @@ -1854,7 +1815,7 @@ public java.util.List getLengths(); List of allowed key lengths, vault-1.10 and above. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} --- @@ -1868,7 +1829,7 @@ public java.lang.String getType(); Key type, choices: rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} --- @@ -1904,7 +1865,6 @@ SshSecretBackendRoleConfig.builder() // .allowedExtensions(java.lang.String) // .allowedUserKeyConfig(IResolvable) // .allowedUserKeyConfig(java.util.List) -// .allowedUserKeyLengths(java.util.Map) // .allowedUsers(java.lang.String) // .allowedUsersTemplate(java.lang.Boolean) // .allowedUsersTemplate(IResolvable) @@ -1942,34 +1902,33 @@ SshSecretBackendRoleConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | -| keyType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | +| keyType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | | name | java.lang.String | Unique name for the role. | -| algorithmSigner | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | -| allowBareDomains | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | -| allowedCriticalOptions | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | -| allowedDomains | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | -| allowedDomainsTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | -| allowedExtensions | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | +| algorithmSigner | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | +| allowBareDomains | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | +| allowedCriticalOptions | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | +| allowedDomains | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | +| allowedDomainsTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | +| allowedExtensions | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | | allowedUserKeyConfig | com.hashicorp.cdktf.IResolvable OR java.util.List<SshSecretBackendRoleAllowedUserKeyConfig> | allowed_user_key_config block. | -| allowedUserKeyLengths | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. | -| allowedUsers | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | -| allowedUsersTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | -| allowHostCertificates | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | -| allowSubdomains | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | -| allowUserCertificates | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | -| allowUserKeyIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | -| cidrList | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | -| defaultCriticalOptions | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | -| defaultExtensions | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | -| defaultUser | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | -| defaultUserTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | -| keyIdFormat | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | -| maxTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | +| allowedUsers | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | +| allowedUsersTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | +| allowHostCertificates | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | +| allowSubdomains | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | +| allowUserCertificates | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | +| allowUserKeyIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | +| cidrList | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | +| defaultCriticalOptions | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | +| defaultExtensions | java.util.Map | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | +| defaultUser | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | +| defaultUserTemplate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | +| keyIdFormat | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | +| maxTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | notBeforeDuration | java.lang.String | Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. | -| ttl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | +| ttl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | --- @@ -2051,7 +2010,7 @@ public java.lang.String getBackend(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. --- @@ -2063,7 +2022,7 @@ public java.lang.String getKeyType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. --- @@ -2077,7 +2036,7 @@ public java.lang.String getName(); Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} --- @@ -2089,7 +2048,7 @@ public java.lang.String getAlgorithmSigner(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. --- @@ -2101,7 +2060,7 @@ public java.lang.Object getAllowBareDomains(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. --- @@ -2113,7 +2072,7 @@ public java.lang.String getAllowedCriticalOptions(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. --- @@ -2125,7 +2084,7 @@ public java.lang.String getAllowedDomains(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. --- @@ -2137,7 +2096,7 @@ public java.lang.Object getAllowedDomainsTemplate(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. --- @@ -2149,7 +2108,7 @@ public java.lang.String getAllowedExtensions(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. --- @@ -2163,19 +2122,7 @@ public java.lang.Object getAllowedUserKeyConfig(); allowed_user_key_config block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} - ---- - -##### `allowedUserKeyLengths`Optional - -```java -public java.util.Map getAllowedUserKeyLengths(); -``` - -- *Type:* java.util.Map - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} --- @@ -2187,7 +2134,7 @@ public java.lang.String getAllowedUsers(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. --- @@ -2199,7 +2146,7 @@ public java.lang.Object getAllowedUsersTemplate(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. --- @@ -2211,7 +2158,7 @@ public java.lang.Object getAllowHostCertificates(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. --- @@ -2223,7 +2170,7 @@ public java.lang.Object getAllowSubdomains(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. --- @@ -2235,7 +2182,7 @@ public java.lang.Object getAllowUserCertificates(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. --- @@ -2247,7 +2194,7 @@ public java.lang.Object getAllowUserKeyIds(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. --- @@ -2259,7 +2206,7 @@ public java.lang.String getCidrList(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. --- @@ -2271,7 +2218,7 @@ public java.util.Map getDefaultCriticalOptio - *Type:* java.util.Map -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. --- @@ -2283,7 +2230,7 @@ public java.util.Map getDefaultExtensions(); - *Type:* java.util.Map -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. --- @@ -2295,7 +2242,7 @@ public java.lang.String getDefaultUser(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. --- @@ -2307,7 +2254,7 @@ public java.lang.Object getDefaultUserTemplate(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. --- @@ -2319,7 +2266,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2334,7 +2281,7 @@ public java.lang.String getKeyIdFormat(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. --- @@ -2346,7 +2293,7 @@ public java.lang.String getMaxTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. --- @@ -2360,7 +2307,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} --- @@ -2374,7 +2321,7 @@ public java.lang.String getNotBeforeDuration(); Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} --- @@ -2386,7 +2333,7 @@ public java.lang.String getTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. --- diff --git a/docs/sshSecretBackendRole.python.md b/docs/sshSecretBackendRole.python.md index bfe71d2c..6920dd7f 100644 --- a/docs/sshSecretBackendRole.python.md +++ b/docs/sshSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### SshSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. #### Initializers @@ -31,7 +31,6 @@ sshSecretBackendRole.SshSecretBackendRole( allowed_domains_template: typing.Union[bool, IResolvable] = None, allowed_extensions: str = None, allowed_user_key_config: typing.Union[IResolvable, typing.List[SshSecretBackendRoleAllowedUserKeyConfig]] = None, - allowed_user_key_lengths: typing.Mapping[typing.Union[int, float]] = None, allowed_users: str = None, allowed_users_template: typing.Union[bool, IResolvable] = None, allow_host_certificates: typing.Union[bool, IResolvable] = None, @@ -63,34 +62,33 @@ sshSecretBackendRole.SshSecretBackendRole( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | -| key_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | +| key_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | | name | str | Unique name for the role. | -| algorithm_signer | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | -| allow_bare_domains | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | -| allowed_critical_options | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | -| allowed_domains | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | -| allowed_domains_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | -| allowed_extensions | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | +| algorithm_signer | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | +| allow_bare_domains | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | +| allowed_critical_options | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | +| allowed_domains | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | +| allowed_domains_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | +| allowed_extensions | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | | allowed_user_key_config | typing.Union[cdktf.IResolvable, typing.List[SshSecretBackendRoleAllowedUserKeyConfig]] | allowed_user_key_config block. | -| allowed_user_key_lengths | typing.Mapping[typing.Union[int, float]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. | -| allowed_users | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | -| allowed_users_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | -| allow_host_certificates | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | -| allow_subdomains | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | -| allow_user_certificates | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | -| allow_user_key_ids | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | -| cidr_list | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | -| default_critical_options | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | -| default_extensions | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | -| default_user | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | -| default_user_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | -| key_id_format | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | -| max_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | +| allowed_users | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | +| allowed_users_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | +| allow_host_certificates | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | +| allow_subdomains | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | +| allow_user_certificates | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | +| allow_user_key_ids | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | +| cidr_list | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | +| default_critical_options | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | +| default_extensions | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | +| default_user | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | +| default_user_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | +| key_id_format | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | +| max_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | | namespace | str | Target namespace. (requires Enterprise). | | not_before_duration | str | Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. | -| ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | +| ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | --- @@ -158,7 +156,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. --- @@ -166,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. --- @@ -176,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} --- @@ -184,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. --- @@ -192,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. --- @@ -200,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. --- @@ -208,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. --- @@ -216,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. --- @@ -224,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. --- @@ -234,15 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi allowed_user_key_config block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} - ---- - -##### `allowed_user_key_lengths`Optional - -- *Type:* typing.Mapping[typing.Union[int, float]] - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} --- @@ -250,7 +240,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. --- @@ -258,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. --- @@ -266,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. --- @@ -274,7 +264,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. --- @@ -282,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. --- @@ -290,7 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. --- @@ -298,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. --- @@ -306,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Mapping[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. --- @@ -314,7 +304,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Mapping[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. --- @@ -322,7 +312,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. --- @@ -330,7 +320,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. --- @@ -338,7 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -349,7 +339,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. --- @@ -357,7 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. --- @@ -367,7 +357,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} --- @@ -377,7 +367,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} --- @@ -385,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. --- @@ -424,7 +414,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_allowed_domains_template | *No description.* | | reset_allowed_extensions | *No description.* | | reset_allowed_user_key_config | *No description.* | -| reset_allowed_user_key_lengths | *No description.* | | reset_allowed_users | *No description.* | | reset_allowed_users_template | *No description.* | | reset_allow_host_certificates | *No description.* | @@ -826,12 +815,6 @@ def reset_allowed_extensions() -> None def reset_allowed_user_key_config() -> None ``` -##### `reset_allowed_user_key_lengths` - -```python -def reset_allowed_user_key_lengths() -> None -``` - ##### `reset_allowed_users` ```python @@ -1048,7 +1031,7 @@ The construct id used in the generated config for the SshSecretBackendRole to im The id of the existing SshSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1086,7 +1069,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowed_domains_template_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | allowed_extensions_input | str | *No description.* | | allowed_user_key_config_input | typing.Union[cdktf.IResolvable, typing.List[SshSecretBackendRoleAllowedUserKeyConfig]] | *No description.* | -| allowed_user_key_lengths_input | typing.Mapping[typing.Union[int, float]] | *No description.* | | allowed_users_input | str | *No description.* | | allowed_users_template_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | allow_host_certificates_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -1113,7 +1095,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowed_domains | str | *No description.* | | allowed_domains_template | typing.Union[bool, cdktf.IResolvable] | *No description.* | | allowed_extensions | str | *No description.* | -| allowed_user_key_lengths | typing.Mapping[typing.Union[int, float]] | *No description.* | | allowed_users | str | *No description.* | | allowed_users_template | typing.Union[bool, cdktf.IResolvable] | *No description.* | | allow_host_certificates | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -1359,16 +1340,6 @@ allowed_user_key_config_input: typing.Union[IResolvable, typing.List[SshSecretBa --- -##### `allowed_user_key_lengths_input`Optional - -```python -allowed_user_key_lengths_input: typing.Mapping[typing.Union[int, float]] -``` - -- *Type:* typing.Mapping[typing.Union[int, float]] - ---- - ##### `allowed_users_input`Optional ```python @@ -1629,16 +1600,6 @@ allowed_extensions: str --- -##### `allowed_user_key_lengths`Required - -```python -allowed_user_key_lengths: typing.Mapping[typing.Union[int, float]] -``` - -- *Type:* typing.Mapping[typing.Union[int, float]] - ---- - ##### `allowed_users`Required ```python @@ -1891,7 +1852,7 @@ lengths: typing.List[typing.Union[int, float]] List of allowed key lengths, vault-1.10 and above. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} --- @@ -1905,7 +1866,7 @@ type: str Key type, choices: rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} --- @@ -1934,7 +1895,6 @@ sshSecretBackendRole.SshSecretBackendRoleConfig( allowed_domains_template: typing.Union[bool, IResolvable] = None, allowed_extensions: str = None, allowed_user_key_config: typing.Union[IResolvable, typing.List[SshSecretBackendRoleAllowedUserKeyConfig]] = None, - allowed_user_key_lengths: typing.Mapping[typing.Union[int, float]] = None, allowed_users: str = None, allowed_users_template: typing.Union[bool, IResolvable] = None, allow_host_certificates: typing.Union[bool, IResolvable] = None, @@ -1966,34 +1926,33 @@ sshSecretBackendRole.SshSecretBackendRoleConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | -| key_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | +| key_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | | name | str | Unique name for the role. | -| algorithm_signer | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | -| allow_bare_domains | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | -| allowed_critical_options | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | -| allowed_domains | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | -| allowed_domains_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | -| allowed_extensions | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | +| algorithm_signer | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | +| allow_bare_domains | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | +| allowed_critical_options | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | +| allowed_domains | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | +| allowed_domains_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | +| allowed_extensions | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | | allowed_user_key_config | typing.Union[cdktf.IResolvable, typing.List[SshSecretBackendRoleAllowedUserKeyConfig]] | allowed_user_key_config block. | -| allowed_user_key_lengths | typing.Mapping[typing.Union[int, float]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. | -| allowed_users | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | -| allowed_users_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | -| allow_host_certificates | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | -| allow_subdomains | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | -| allow_user_certificates | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | -| allow_user_key_ids | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | -| cidr_list | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | -| default_critical_options | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | -| default_extensions | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | -| default_user | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | -| default_user_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | -| key_id_format | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | -| max_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | +| allowed_users | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | +| allowed_users_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | +| allow_host_certificates | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | +| allow_subdomains | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | +| allow_user_certificates | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | +| allow_user_key_ids | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | +| cidr_list | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | +| default_critical_options | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | +| default_extensions | typing.Mapping[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | +| default_user | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | +| default_user_template | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | +| key_id_format | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | +| max_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | | namespace | str | Target namespace. (requires Enterprise). | | not_before_duration | str | Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. | -| ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | +| ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | --- @@ -2075,7 +2034,7 @@ backend: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. --- @@ -2087,7 +2046,7 @@ key_type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. --- @@ -2101,7 +2060,7 @@ name: str Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} --- @@ -2113,7 +2072,7 @@ algorithm_signer: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. --- @@ -2125,7 +2084,7 @@ allow_bare_domains: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. --- @@ -2137,7 +2096,7 @@ allowed_critical_options: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. --- @@ -2149,7 +2108,7 @@ allowed_domains: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. --- @@ -2161,7 +2120,7 @@ allowed_domains_template: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. --- @@ -2173,7 +2132,7 @@ allowed_extensions: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. --- @@ -2187,19 +2146,7 @@ allowed_user_key_config: typing.Union[IResolvable, typing.List[SshSecretBackendR allowed_user_key_config block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} - ---- - -##### `allowed_user_key_lengths`Optional - -```python -allowed_user_key_lengths: typing.Mapping[typing.Union[int, float]] -``` - -- *Type:* typing.Mapping[typing.Union[int, float]] - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} --- @@ -2211,7 +2158,7 @@ allowed_users: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. --- @@ -2223,7 +2170,7 @@ allowed_users_template: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. --- @@ -2235,7 +2182,7 @@ allow_host_certificates: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. --- @@ -2247,7 +2194,7 @@ allow_subdomains: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. --- @@ -2259,7 +2206,7 @@ allow_user_certificates: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. --- @@ -2271,7 +2218,7 @@ allow_user_key_ids: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. --- @@ -2283,7 +2230,7 @@ cidr_list: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. --- @@ -2295,7 +2242,7 @@ default_critical_options: typing.Mapping[str] - *Type:* typing.Mapping[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. --- @@ -2307,7 +2254,7 @@ default_extensions: typing.Mapping[str] - *Type:* typing.Mapping[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. --- @@ -2319,7 +2266,7 @@ default_user: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. --- @@ -2331,7 +2278,7 @@ default_user_template: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. --- @@ -2343,7 +2290,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2358,7 +2305,7 @@ key_id_format: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. --- @@ -2370,7 +2317,7 @@ max_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. --- @@ -2384,7 +2331,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} --- @@ -2398,7 +2345,7 @@ not_before_duration: str Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} --- @@ -2410,7 +2357,7 @@ ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. --- diff --git a/docs/sshSecretBackendRole.typescript.md b/docs/sshSecretBackendRole.typescript.md index 6901321a..8b1edfd7 100644 --- a/docs/sshSecretBackendRole.typescript.md +++ b/docs/sshSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### SshSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role}. #### Initializers @@ -81,7 +81,6 @@ Must be unique amongst siblings in the same scope | resetAllowedDomainsTemplate | *No description.* | | resetAllowedExtensions | *No description.* | | resetAllowedUserKeyConfig | *No description.* | -| resetAllowedUserKeyLengths | *No description.* | | resetAllowedUsers | *No description.* | | resetAllowedUsersTemplate | *No description.* | | resetAllowHostCertificates | *No description.* | @@ -444,12 +443,6 @@ public resetAllowedExtensions(): void public resetAllowedUserKeyConfig(): void ``` -##### `resetAllowedUserKeyLengths` - -```typescript -public resetAllowedUserKeyLengths(): void -``` - ##### `resetAllowedUsers` ```typescript @@ -655,7 +648,7 @@ The construct id used in the generated config for the SshSecretBackendRole to im The id of the existing SshSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -693,7 +686,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowedDomainsTemplateInput | boolean \| cdktf.IResolvable | *No description.* | | allowedExtensionsInput | string | *No description.* | | allowedUserKeyConfigInput | cdktf.IResolvable \| SshSecretBackendRoleAllowedUserKeyConfig[] | *No description.* | -| allowedUserKeyLengthsInput | {[ key: string ]: number} | *No description.* | | allowedUsersInput | string | *No description.* | | allowedUsersTemplateInput | boolean \| cdktf.IResolvable | *No description.* | | allowHostCertificatesInput | boolean \| cdktf.IResolvable | *No description.* | @@ -720,7 +712,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | allowedDomains | string | *No description.* | | allowedDomainsTemplate | boolean \| cdktf.IResolvable | *No description.* | | allowedExtensions | string | *No description.* | -| allowedUserKeyLengths | {[ key: string ]: number} | *No description.* | | allowedUsers | string | *No description.* | | allowedUsersTemplate | boolean \| cdktf.IResolvable | *No description.* | | allowHostCertificates | boolean \| cdktf.IResolvable | *No description.* | @@ -966,16 +957,6 @@ public readonly allowedUserKeyConfigInput: IResolvable | SshSecretBackendRoleAll --- -##### `allowedUserKeyLengthsInput`Optional - -```typescript -public readonly allowedUserKeyLengthsInput: {[ key: string ]: number}; -``` - -- *Type:* {[ key: string ]: number} - ---- - ##### `allowedUsersInput`Optional ```typescript @@ -1236,16 +1217,6 @@ public readonly allowedExtensions: string; --- -##### `allowedUserKeyLengths`Required - -```typescript -public readonly allowedUserKeyLengths: {[ key: string ]: number}; -``` - -- *Type:* {[ key: string ]: number} - ---- - ##### `allowedUsers`Required ```typescript @@ -1495,7 +1466,7 @@ public readonly lengths: number[]; List of allowed key lengths, vault-1.10 and above. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} --- @@ -1509,7 +1480,7 @@ public readonly type: string; Key type, choices: rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} --- @@ -1534,34 +1505,33 @@ const sshSecretBackendRoleConfig: sshSecretBackendRole.SshSecretBackendRoleConfi | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | -| keyType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | +| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. | +| keyType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. | | name | string | Unique name for the role. | -| algorithmSigner | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | -| allowBareDomains | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | -| allowedCriticalOptions | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | -| allowedDomains | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | -| allowedDomainsTemplate | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | -| allowedExtensions | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | +| algorithmSigner | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. | +| allowBareDomains | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. | +| allowedCriticalOptions | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. | +| allowedDomains | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. | +| allowedDomainsTemplate | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. | +| allowedExtensions | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. | | allowedUserKeyConfig | cdktf.IResolvable \| SshSecretBackendRoleAllowedUserKeyConfig[] | allowed_user_key_config block. | -| allowedUserKeyLengths | {[ key: string ]: number} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. | -| allowedUsers | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | -| allowedUsersTemplate | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | -| allowHostCertificates | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | -| allowSubdomains | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | -| allowUserCertificates | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | -| allowUserKeyIds | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | -| cidrList | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | -| defaultCriticalOptions | {[ key: string ]: string} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | -| defaultExtensions | {[ key: string ]: string} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | -| defaultUser | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | -| defaultUserTemplate | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | -| keyIdFormat | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | -| maxTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | +| allowedUsers | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. | +| allowedUsersTemplate | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. | +| allowHostCertificates | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. | +| allowSubdomains | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. | +| allowUserCertificates | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. | +| allowUserKeyIds | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. | +| cidrList | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. | +| defaultCriticalOptions | {[ key: string ]: string} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. | +| defaultExtensions | {[ key: string ]: string} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. | +| defaultUser | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. | +| defaultUserTemplate | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. | +| keyIdFormat | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. | +| maxTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. | | namespace | string | Target namespace. (requires Enterprise). | | notBeforeDuration | string | Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. | -| ttl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | +| ttl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. | --- @@ -1643,7 +1613,7 @@ public readonly backend: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend}. --- @@ -1655,7 +1625,7 @@ public readonly keyType: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type}. --- @@ -1669,7 +1639,7 @@ public readonly name: string; Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} --- @@ -1681,7 +1651,7 @@ public readonly algorithmSigner: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer}. --- @@ -1693,7 +1663,7 @@ public readonly allowBareDomains: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains}. --- @@ -1705,7 +1675,7 @@ public readonly allowedCriticalOptions: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options}. --- @@ -1717,7 +1687,7 @@ public readonly allowedDomains: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains}. --- @@ -1729,7 +1699,7 @@ public readonly allowedDomainsTemplate: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template}. --- @@ -1741,7 +1711,7 @@ public readonly allowedExtensions: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions}. --- @@ -1755,19 +1725,7 @@ public readonly allowedUserKeyConfig: IResolvable | SshSecretBackendRoleAllowedU allowed_user_key_config block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} - ---- - -##### `allowedUserKeyLengths`Optional - -```typescript -public readonly allowedUserKeyLengths: {[ key: string ]: number}; -``` - -- *Type:* {[ key: string ]: number} - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} --- @@ -1779,7 +1737,7 @@ public readonly allowedUsers: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users}. --- @@ -1791,7 +1749,7 @@ public readonly allowedUsersTemplate: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template}. --- @@ -1803,7 +1761,7 @@ public readonly allowHostCertificates: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates}. --- @@ -1815,7 +1773,7 @@ public readonly allowSubdomains: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains}. --- @@ -1827,7 +1785,7 @@ public readonly allowUserCertificates: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates}. --- @@ -1839,7 +1797,7 @@ public readonly allowUserKeyIds: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids}. --- @@ -1851,7 +1809,7 @@ public readonly cidrList: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list}. --- @@ -1863,7 +1821,7 @@ public readonly defaultCriticalOptions: {[ key: string ]: string}; - *Type:* {[ key: string ]: string} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options}. --- @@ -1875,7 +1833,7 @@ public readonly defaultExtensions: {[ key: string ]: string}; - *Type:* {[ key: string ]: string} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions}. --- @@ -1887,7 +1845,7 @@ public readonly defaultUser: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user}. --- @@ -1899,7 +1857,7 @@ public readonly defaultUserTemplate: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template}. --- @@ -1911,7 +1869,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1926,7 +1884,7 @@ public readonly keyIdFormat: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format}. --- @@ -1938,7 +1896,7 @@ public readonly maxTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl}. --- @@ -1952,7 +1910,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} --- @@ -1966,7 +1924,7 @@ public readonly notBeforeDuration: string; Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} --- @@ -1978,7 +1936,7 @@ public readonly ttl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl}. --- diff --git a/docs/terraformCloudSecretBackend.csharp.md b/docs/terraformCloudSecretBackend.csharp.md index d46d273a..307f313f 100644 --- a/docs/terraformCloudSecretBackend.csharp.md +++ b/docs/terraformCloudSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. #### Initializers @@ -537,7 +537,7 @@ The construct id used in the generated config for the TerraformCloudSecretBacken The id of the existing TerraformCloudSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ new TerraformCloudSecretBackendConfig { | DefaultLeaseTtlSeconds | double | Default lease duration for secrets in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for secrets in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | | Token | string | Specifies the Terraform Cloud access token to use. | @@ -1084,7 +1084,7 @@ public string Address { get; set; } Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} --- @@ -1098,7 +1098,7 @@ public string Backend { get; set; } Unique name of the Vault Terraform Cloud mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} --- @@ -1112,7 +1112,7 @@ public string BasePath { get; set; } Specifies the base path for the Terraform Cloud or Enterprise API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} --- @@ -1126,7 +1126,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} --- @@ -1140,7 +1140,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} --- @@ -1154,7 +1154,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} --- @@ -1166,7 +1166,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} --- @@ -1197,7 +1197,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} --- @@ -1211,7 +1211,7 @@ public string Token { get; set; } Specifies the Terraform Cloud access token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} --- diff --git a/docs/terraformCloudSecretBackend.go.md b/docs/terraformCloudSecretBackend.go.md index aede3411..af470a47 100644 --- a/docs/terraformCloudSecretBackend.go.md +++ b/docs/terraformCloudSecretBackend.go.md @@ -4,12 +4,12 @@ ### TerraformCloudSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretbackend" terraformcloudsecretbackend.NewTerraformCloudSecretBackend(scope Construct, id *string, config TerraformCloudSecretBackendConfig) TerraformCloudSecretBackend ``` @@ -448,7 +448,7 @@ func ResetToken() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretbackend" terraformcloudsecretbackend.TerraformCloudSecretBackend_IsConstruct(x interface{}) *bool ``` @@ -480,7 +480,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretbackend" terraformcloudsecretbackend.TerraformCloudSecretBackend_IsTerraformElement(x interface{}) *bool ``` @@ -494,7 +494,7 @@ terraformcloudsecretbackend.TerraformCloudSecretBackend_IsTerraformElement(x int ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretbackend" terraformcloudsecretbackend.TerraformCloudSecretBackend_IsTerraformResource(x interface{}) *bool ``` @@ -508,7 +508,7 @@ terraformcloudsecretbackend.TerraformCloudSecretBackend_IsTerraformResource(x in ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretbackend" terraformcloudsecretbackend.TerraformCloudSecretBackend_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -537,7 +537,7 @@ The construct id used in the generated config for the TerraformCloudSecretBacken The id of the existing TerraformCloudSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -957,7 +957,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretbackend" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretbackend" &terraformcloudsecretbackend.TerraformCloudSecretBackendConfig { Connection: interface{}, @@ -997,7 +997,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretb | DefaultLeaseTtlSeconds | *f64 | Default lease duration for secrets in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for secrets in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | | Token | *string | Specifies the Terraform Cloud access token to use. | @@ -1084,7 +1084,7 @@ Address *string Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} --- @@ -1098,7 +1098,7 @@ Backend *string Unique name of the Vault Terraform Cloud mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} --- @@ -1112,7 +1112,7 @@ BasePath *string Specifies the base path for the Terraform Cloud or Enterprise API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} --- @@ -1126,7 +1126,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} --- @@ -1140,7 +1140,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} --- @@ -1154,7 +1154,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} --- @@ -1166,7 +1166,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} --- @@ -1197,7 +1197,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} --- @@ -1211,7 +1211,7 @@ Token *string Specifies the Terraform Cloud access token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} --- diff --git a/docs/terraformCloudSecretBackend.java.md b/docs/terraformCloudSecretBackend.java.md index 297a3c8a..5968c467 100644 --- a/docs/terraformCloudSecretBackend.java.md +++ b/docs/terraformCloudSecretBackend.java.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. #### Initializers @@ -54,7 +54,7 @@ TerraformCloudSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | token | java.lang.String | Specifies the Terraform Cloud access token to use. | @@ -127,7 +127,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the Vault Terraform Cloud mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the base path for the Terraform Cloud or Enterprise API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -198,7 +198,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Terraform Cloud access token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} --- @@ -715,7 +715,7 @@ The construct id used in the generated config for the TerraformCloudSecretBacken The id of the existing TerraformCloudSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1180,7 +1180,7 @@ TerraformCloudSecretBackendConfig.builder() | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | token | java.lang.String | Specifies the Terraform Cloud access token to use. | @@ -1267,7 +1267,7 @@ public java.lang.String getAddress(); Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} --- @@ -1281,7 +1281,7 @@ public java.lang.String getBackend(); Unique name of the Vault Terraform Cloud mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} --- @@ -1295,7 +1295,7 @@ public java.lang.String getBasePath(); Specifies the base path for the Terraform Cloud or Enterprise API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} --- @@ -1309,7 +1309,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} --- @@ -1323,7 +1323,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} --- @@ -1337,7 +1337,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} --- @@ -1349,7 +1349,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1366,7 +1366,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} --- @@ -1380,7 +1380,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} --- @@ -1394,7 +1394,7 @@ public java.lang.String getToken(); Specifies the Terraform Cloud access token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} --- diff --git a/docs/terraformCloudSecretBackend.python.md b/docs/terraformCloudSecretBackend.python.md index 916d2a2e..2c3b93ee 100644 --- a/docs/terraformCloudSecretBackend.python.md +++ b/docs/terraformCloudSecretBackend.python.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. #### Initializers @@ -51,7 +51,7 @@ terraformCloudSecretBackend.TerraformCloudSecretBackend( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | | token | str | Specifies the Terraform Cloud access token to use. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the Vault Terraform Cloud mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the base path for the Terraform Cloud or Enterprise API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -195,7 +195,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Terraform Cloud access token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} --- @@ -758,7 +758,7 @@ The construct id used in the generated config for the TerraformCloudSecretBacken The id of the existing TerraformCloudSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1218,7 +1218,7 @@ terraformCloudSecretBackend.TerraformCloudSecretBackendConfig( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | | token | str | Specifies the Terraform Cloud access token to use. | @@ -1305,7 +1305,7 @@ address: str Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} --- @@ -1319,7 +1319,7 @@ backend: str Unique name of the Vault Terraform Cloud mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} --- @@ -1333,7 +1333,7 @@ base_path: str Specifies the base path for the Terraform Cloud or Enterprise API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} --- @@ -1347,7 +1347,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} --- @@ -1361,7 +1361,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} --- @@ -1375,7 +1375,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} --- @@ -1387,7 +1387,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1404,7 +1404,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} --- @@ -1418,7 +1418,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} --- @@ -1432,7 +1432,7 @@ token: str Specifies the Terraform Cloud access token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} --- diff --git a/docs/terraformCloudSecretBackend.typescript.md b/docs/terraformCloudSecretBackend.typescript.md index 3da65628..69a34f7d 100644 --- a/docs/terraformCloudSecretBackend.typescript.md +++ b/docs/terraformCloudSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend}. #### Initializers @@ -537,7 +537,7 @@ The construct id used in the generated config for the TerraformCloudSecretBacken The id of the existing TerraformCloudSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -979,7 +979,7 @@ const terraformCloudSecretBackendConfig: terraformCloudSecretBackend.TerraformCl | defaultLeaseTtlSeconds | number | Default lease duration for secrets in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for secrets in seconds. | | namespace | string | Target namespace. (requires Enterprise). | | token | string | Specifies the Terraform Cloud access token to use. | @@ -1066,7 +1066,7 @@ public readonly address: string; Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} --- @@ -1080,7 +1080,7 @@ public readonly backend: string; Unique name of the Vault Terraform Cloud mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} --- @@ -1094,7 +1094,7 @@ public readonly basePath: string; Specifies the base path for the Terraform Cloud or Enterprise API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} --- @@ -1108,7 +1108,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} --- @@ -1122,7 +1122,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} --- @@ -1136,7 +1136,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} --- @@ -1148,7 +1148,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1165,7 +1165,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} --- @@ -1179,7 +1179,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} --- @@ -1193,7 +1193,7 @@ public readonly token: string; Specifies the Terraform Cloud access token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} --- diff --git a/docs/terraformCloudSecretCreds.csharp.md b/docs/terraformCloudSecretCreds.csharp.md index 6d021206..5ffc24db 100644 --- a/docs/terraformCloudSecretCreds.csharp.md +++ b/docs/terraformCloudSecretCreds.csharp.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the TerraformCloudSecretCreds The id of the existing TerraformCloudSecretCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use --- @@ -854,7 +854,7 @@ new TerraformCloudSecretCredsConfig { | Provisioners | object[] | *No description.* | | Backend | string | Terraform Cloud secret backend to generate tokens from. | | Role | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ public string Backend { get; set; } Terraform Cloud secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} --- @@ -953,7 +953,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} --- @@ -965,7 +965,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -982,7 +982,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} --- diff --git a/docs/terraformCloudSecretCreds.go.md b/docs/terraformCloudSecretCreds.go.md index 141ab3ef..53103c1c 100644 --- a/docs/terraformCloudSecretCreds.go.md +++ b/docs/terraformCloudSecretCreds.go.md @@ -4,12 +4,12 @@ ### TerraformCloudSecretCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretcreds" terraformcloudsecretcreds.NewTerraformCloudSecretCreds(scope Construct, id *string, config TerraformCloudSecretCredsConfig) TerraformCloudSecretCreds ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretcreds" terraformcloudsecretcreds.TerraformCloudSecretCreds_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretcreds" terraformcloudsecretcreds.TerraformCloudSecretCreds_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ terraformcloudsecretcreds.TerraformCloudSecretCreds_IsTerraformElement(x interfa ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretcreds" terraformcloudsecretcreds.TerraformCloudSecretCreds_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ terraformcloudsecretcreds.TerraformCloudSecretCreds_IsTerraformResource(x interf ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretcreds" terraformcloudsecretcreds.TerraformCloudSecretCreds_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the TerraformCloudSecretCreds The id of the existing TerraformCloudSecretCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use --- @@ -824,7 +824,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretcreds" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretcreds" &terraformcloudsecretcreds.TerraformCloudSecretCredsConfig { Connection: interface{}, @@ -854,7 +854,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretc | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Terraform Cloud secret backend to generate tokens from. | | Role | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ Backend *string Terraform Cloud secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} --- @@ -953,7 +953,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} --- @@ -965,7 +965,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -982,7 +982,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} --- diff --git a/docs/terraformCloudSecretCreds.java.md b/docs/terraformCloudSecretCreds.java.md index 44dea939..3e3c6da2 100644 --- a/docs/terraformCloudSecretCreds.java.md +++ b/docs/terraformCloudSecretCreds.java.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. #### Initializers @@ -43,7 +43,7 @@ TerraformCloudSecretCreds.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Terraform Cloud secret backend to generate tokens from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Terraform Cloud secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the TerraformCloudSecretCreds The id of the existing TerraformCloudSecretCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use --- @@ -963,7 +963,7 @@ TerraformCloudSecretCredsConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Terraform Cloud secret backend to generate tokens from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1048,7 +1048,7 @@ public java.lang.String getBackend(); Terraform Cloud secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} --- @@ -1062,7 +1062,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} --- @@ -1074,7 +1074,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1091,7 +1091,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} --- diff --git a/docs/terraformCloudSecretCreds.python.md b/docs/terraformCloudSecretCreds.python.md index 80930980..3dbb65f5 100644 --- a/docs/terraformCloudSecretCreds.python.md +++ b/docs/terraformCloudSecretCreds.python.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. #### Initializers @@ -41,7 +41,7 @@ terraformCloudSecretCreds.TerraformCloudSecretCreds( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Terraform Cloud secret backend to generate tokens from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Terraform Cloud secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the TerraformCloudSecretCreds The id of the existing TerraformCloudSecretCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use --- @@ -1003,7 +1003,7 @@ terraformCloudSecretCreds.TerraformCloudSecretCredsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Terraform Cloud secret backend to generate tokens from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1088,7 +1088,7 @@ backend: str Terraform Cloud secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} --- @@ -1102,7 +1102,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} --- @@ -1114,7 +1114,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1131,7 +1131,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} --- diff --git a/docs/terraformCloudSecretCreds.typescript.md b/docs/terraformCloudSecretCreds.typescript.md index 51625331..97239e64 100644 --- a/docs/terraformCloudSecretCreds.typescript.md +++ b/docs/terraformCloudSecretCreds.typescript.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the TerraformCloudSecretCreds The id of the existing TerraformCloudSecretCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use --- @@ -842,7 +842,7 @@ const terraformCloudSecretCredsConfig: terraformCloudSecretCreds.TerraformCloudS | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Terraform Cloud secret backend to generate tokens from. | | role | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -927,7 +927,7 @@ public readonly backend: string; Terraform Cloud secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} --- @@ -941,7 +941,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} --- @@ -953,7 +953,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -970,7 +970,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} --- diff --git a/docs/terraformCloudSecretRole.csharp.md b/docs/terraformCloudSecretRole.csharp.md index 33958a09..41f97c57 100644 --- a/docs/terraformCloudSecretRole.csharp.md +++ b/docs/terraformCloudSecretRole.csharp.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the TerraformCloudSecretRole t The id of the existing TerraformCloudSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -956,7 +956,7 @@ new TerraformCloudSecretRoleConfig { | Provisioners | object[] | *No description.* | | Name | string | The name of an existing role against which to create this Terraform Cloud credential. | | Backend | string | The path of the Terraform Cloud Secret Backend the role belongs to. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | | MaxTtl | double | Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. | | Namespace | string | Target namespace. (requires Enterprise). | | Organization | string | Name of the Terraform Cloud or Enterprise organization. | @@ -1046,7 +1046,7 @@ public string Name { get; set; } The name of an existing role against which to create this Terraform Cloud credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} --- @@ -1060,7 +1060,7 @@ public string Backend { get; set; } The path of the Terraform Cloud Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} --- @@ -1072,7 +1072,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1089,7 +1089,7 @@ public double MaxTtl { get; set; } Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} --- @@ -1103,7 +1103,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} --- @@ -1117,7 +1117,7 @@ public string Organization { get; set; } Name of the Terraform Cloud or Enterprise organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} --- @@ -1131,7 +1131,7 @@ public string TeamId { get; set; } ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} --- @@ -1145,7 +1145,7 @@ public double Ttl { get; set; } Default lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} --- @@ -1159,7 +1159,7 @@ public string UserId { get; set; } ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} --- diff --git a/docs/terraformCloudSecretRole.go.md b/docs/terraformCloudSecretRole.go.md index 171f4dab..cd75fd8c 100644 --- a/docs/terraformCloudSecretRole.go.md +++ b/docs/terraformCloudSecretRole.go.md @@ -4,12 +4,12 @@ ### TerraformCloudSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretrole" terraformcloudsecretrole.NewTerraformCloudSecretRole(scope Construct, id *string, config TerraformCloudSecretRoleConfig) TerraformCloudSecretRole ``` @@ -434,7 +434,7 @@ func ResetUserId() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretrole" terraformcloudsecretrole.TerraformCloudSecretRole_IsConstruct(x interface{}) *bool ``` @@ -466,7 +466,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretrole" terraformcloudsecretrole.TerraformCloudSecretRole_IsTerraformElement(x interface{}) *bool ``` @@ -480,7 +480,7 @@ terraformcloudsecretrole.TerraformCloudSecretRole_IsTerraformElement(x interface ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretrole" terraformcloudsecretrole.TerraformCloudSecretRole_IsTerraformResource(x interface{}) *bool ``` @@ -494,7 +494,7 @@ terraformcloudsecretrole.TerraformCloudSecretRole_IsTerraformResource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretrole" terraformcloudsecretrole.TerraformCloudSecretRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -523,7 +523,7 @@ The construct id used in the generated config for the TerraformCloudSecretRole t The id of the existing TerraformCloudSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -921,7 +921,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/terraformcloudsecretrole" &terraformcloudsecretrole.TerraformCloudSecretRoleConfig { Connection: interface{}, @@ -956,7 +956,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/terraformcloudsecretr | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of an existing role against which to create this Terraform Cloud credential. | | Backend | *string | The path of the Terraform Cloud Secret Backend the role belongs to. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | | MaxTtl | *f64 | Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. | | Namespace | *string | Target namespace. (requires Enterprise). | | Organization | *string | Name of the Terraform Cloud or Enterprise organization. | @@ -1046,7 +1046,7 @@ Name *string The name of an existing role against which to create this Terraform Cloud credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} --- @@ -1060,7 +1060,7 @@ Backend *string The path of the Terraform Cloud Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} --- @@ -1072,7 +1072,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1089,7 +1089,7 @@ MaxTtl *f64 Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} --- @@ -1103,7 +1103,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} --- @@ -1117,7 +1117,7 @@ Organization *string Name of the Terraform Cloud or Enterprise organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} --- @@ -1131,7 +1131,7 @@ TeamId *string ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} --- @@ -1145,7 +1145,7 @@ Ttl *f64 Default lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} --- @@ -1159,7 +1159,7 @@ UserId *string ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} --- diff --git a/docs/terraformCloudSecretRole.java.md b/docs/terraformCloudSecretRole.java.md index 0f38728b..7596cd74 100644 --- a/docs/terraformCloudSecretRole.java.md +++ b/docs/terraformCloudSecretRole.java.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. #### Initializers @@ -48,7 +48,7 @@ TerraformCloudSecretRole.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of an existing role against which to create this Terraform Cloud credential. | | backend | java.lang.String | The path of the Terraform Cloud Secret Backend the role belongs to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | | maxTtl | java.lang.Number | Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | organization | java.lang.String | Name of the Terraform Cloud or Enterprise organization. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The name of an existing role against which to create this Terraform Cloud credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path of the Terraform Cloud Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Terraform Cloud or Enterprise organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} --- @@ -688,7 +688,7 @@ The construct id used in the generated config for the TerraformCloudSecretRole t The id of the existing TerraformCloudSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1125,7 +1125,7 @@ TerraformCloudSecretRoleConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of an existing role against which to create this Terraform Cloud credential. | | backend | java.lang.String | The path of the Terraform Cloud Secret Backend the role belongs to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | | maxTtl | java.lang.Number | Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | organization | java.lang.String | Name of the Terraform Cloud or Enterprise organization. | @@ -1215,7 +1215,7 @@ public java.lang.String getName(); The name of an existing role against which to create this Terraform Cloud credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} --- @@ -1229,7 +1229,7 @@ public java.lang.String getBackend(); The path of the Terraform Cloud Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} --- @@ -1241,7 +1241,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1258,7 +1258,7 @@ public java.lang.Number getMaxTtl(); Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} --- @@ -1272,7 +1272,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} --- @@ -1286,7 +1286,7 @@ public java.lang.String getOrganization(); Name of the Terraform Cloud or Enterprise organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} --- @@ -1300,7 +1300,7 @@ public java.lang.String getTeamId(); ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} --- @@ -1314,7 +1314,7 @@ public java.lang.Number getTtl(); Default lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} --- @@ -1328,7 +1328,7 @@ public java.lang.String getUserId(); ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} --- diff --git a/docs/terraformCloudSecretRole.python.md b/docs/terraformCloudSecretRole.python.md index e854d4e4..2b316154 100644 --- a/docs/terraformCloudSecretRole.python.md +++ b/docs/terraformCloudSecretRole.python.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. #### Initializers @@ -46,7 +46,7 @@ terraformCloudSecretRole.TerraformCloudSecretRole( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of an existing role against which to create this Terraform Cloud credential. | | backend | str | The path of the Terraform Cloud Secret Backend the role belongs to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | | max_ttl | typing.Union[int, float] | Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. | | namespace | str | Target namespace. (requires Enterprise). | | organization | str | Name of the Terraform Cloud or Enterprise organization. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope The name of an existing role against which to create this Terraform Cloud credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path of the Terraform Cloud Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Terraform Cloud or Enterprise organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} --- @@ -732,7 +732,7 @@ The construct id used in the generated config for the TerraformCloudSecretRole t The id of the existing TerraformCloudSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1165,7 +1165,7 @@ terraformCloudSecretRole.TerraformCloudSecretRoleConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of an existing role against which to create this Terraform Cloud credential. | | backend | str | The path of the Terraform Cloud Secret Backend the role belongs to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | | max_ttl | typing.Union[int, float] | Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. | | namespace | str | Target namespace. (requires Enterprise). | | organization | str | Name of the Terraform Cloud or Enterprise organization. | @@ -1255,7 +1255,7 @@ name: str The name of an existing role against which to create this Terraform Cloud credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} --- @@ -1269,7 +1269,7 @@ backend: str The path of the Terraform Cloud Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} --- @@ -1281,7 +1281,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1298,7 +1298,7 @@ max_ttl: typing.Union[int, float] Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} --- @@ -1312,7 +1312,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} --- @@ -1326,7 +1326,7 @@ organization: str Name of the Terraform Cloud or Enterprise organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} --- @@ -1340,7 +1340,7 @@ team_id: str ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} --- @@ -1354,7 +1354,7 @@ ttl: typing.Union[int, float] Default lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} --- @@ -1368,7 +1368,7 @@ user_id: str ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} --- diff --git a/docs/terraformCloudSecretRole.typescript.md b/docs/terraformCloudSecretRole.typescript.md index 8c46a6df..aceeaab0 100644 --- a/docs/terraformCloudSecretRole.typescript.md +++ b/docs/terraformCloudSecretRole.typescript.md @@ -4,7 +4,7 @@ ### TerraformCloudSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the TerraformCloudSecretRole t The id of the existing TerraformCloudSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -939,7 +939,7 @@ const terraformCloudSecretRoleConfig: terraformCloudSecretRole.TerraformCloudSec | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of an existing role against which to create this Terraform Cloud credential. | | backend | string | The path of the Terraform Cloud Secret Backend the role belongs to. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. | | maxTtl | number | Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. | | namespace | string | Target namespace. (requires Enterprise). | | organization | string | Name of the Terraform Cloud or Enterprise organization. | @@ -1029,7 +1029,7 @@ public readonly name: string; The name of an existing role against which to create this Terraform Cloud credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} --- @@ -1043,7 +1043,7 @@ public readonly backend: string; The path of the Terraform Cloud Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} --- @@ -1055,7 +1055,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1072,7 +1072,7 @@ public readonly maxTtl: number; Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} --- @@ -1086,7 +1086,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} --- @@ -1100,7 +1100,7 @@ public readonly organization: string; Name of the Terraform Cloud or Enterprise organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} --- @@ -1114,7 +1114,7 @@ public readonly teamId: string; ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} --- @@ -1128,7 +1128,7 @@ public readonly ttl: number; Default lease for generated credentials. If not set or set to 0, will use system default. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} --- @@ -1142,7 +1142,7 @@ public readonly userId: string; ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} --- diff --git a/docs/token.csharp.md b/docs/token.csharp.md index d152c607..d7552ecf 100644 --- a/docs/token.csharp.md +++ b/docs/token.csharp.md @@ -4,7 +4,7 @@ ### Token -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token vault_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token vault_token}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the Token to import. The id of the existing Token that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#import import section} in the documentation of this resource for the id to use --- @@ -1228,7 +1228,7 @@ new TokenConfig { | Provisioners | object[] | *No description.* | | DisplayName | string | The display name of the token. | | ExplicitMaxTtl | string | The explicit max TTL of the token. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. | | Metadata | System.Collections.Generic.IDictionary | Metadata to be associated with the token. | | Namespace | string | Target namespace. (requires Enterprise). | | NoDefaultPolicy | object | Flag to disable the default policy. | @@ -1325,7 +1325,7 @@ public string DisplayName { get; set; } The display name of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#display_name Token#display_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#display_name Token#display_name} --- @@ -1339,7 +1339,7 @@ public string ExplicitMaxTtl { get; set; } The explicit max TTL of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} --- @@ -1351,7 +1351,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1368,7 +1368,7 @@ public System.Collections.Generic.IDictionary Metadata { get; se Metadata to be associated with the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#metadata Token#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#metadata Token#metadata} --- @@ -1382,7 +1382,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#namespace Token#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#namespace Token#namespace} --- @@ -1396,7 +1396,7 @@ public object NoDefaultPolicy { get; set; } Flag to disable the default policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_default_policy Token#no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_default_policy Token#no_default_policy} --- @@ -1410,7 +1410,7 @@ public object NoParent { get; set; } Flag to create a token without parent. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_parent Token#no_parent} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_parent Token#no_parent} --- @@ -1424,7 +1424,7 @@ public double NumUses { get; set; } The number of allowed uses of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#num_uses Token#num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#num_uses Token#num_uses} --- @@ -1438,7 +1438,7 @@ public string Period { get; set; } The period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#period Token#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#period Token#period} --- @@ -1452,7 +1452,7 @@ public string[] Policies { get; set; } List of policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#policies Token#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#policies Token#policies} --- @@ -1466,7 +1466,7 @@ public object Renewable { get; set; } Flag to allow the token to be renewed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renewable Token#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renewable Token#renewable} --- @@ -1480,7 +1480,7 @@ public double RenewIncrement { get; set; } The renew increment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_increment Token#renew_increment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_increment Token#renew_increment} --- @@ -1494,7 +1494,7 @@ public double RenewMinLease { get; set; } The minimum lease to renew token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_min_lease Token#renew_min_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_min_lease Token#renew_min_lease} --- @@ -1508,7 +1508,7 @@ public string RoleName { get; set; } The token role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#role_name Token#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#role_name Token#role_name} --- @@ -1522,7 +1522,7 @@ public string Ttl { get; set; } The TTL period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#ttl Token#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#ttl Token#ttl} --- @@ -1536,7 +1536,7 @@ public string WrappingTtl { get; set; } The TTL period of the wrapped token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} --- diff --git a/docs/token.go.md b/docs/token.go.md index e82dfbc1..ca1eb7c2 100644 --- a/docs/token.go.md +++ b/docs/token.go.md @@ -4,12 +4,12 @@ ### Token -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token vault_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token vault_token}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/token" token.NewToken(scope Construct, id *string, config TokenConfig) Token ``` @@ -490,7 +490,7 @@ func ResetWrappingTtl() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/token" token.Token_IsConstruct(x interface{}) *bool ``` @@ -522,7 +522,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/token" token.Token_IsTerraformElement(x interface{}) *bool ``` @@ -536,7 +536,7 @@ token.Token_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/token" token.Token_IsTerraformResource(x interface{}) *bool ``` @@ -550,7 +550,7 @@ token.Token_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/token" token.Token_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -579,7 +579,7 @@ The construct id used in the generated config for the Token to import. The id of the existing Token that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#import import section} in the documentation of this resource for the id to use --- @@ -1186,7 +1186,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/token" &token.TokenConfig { Connection: interface{}, @@ -1228,7 +1228,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/token" | Provisioners | *[]interface{} | *No description.* | | DisplayName | *string | The display name of the token. | | ExplicitMaxTtl | *string | The explicit max TTL of the token. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. | | Metadata | *map[string]*string | Metadata to be associated with the token. | | Namespace | *string | Target namespace. (requires Enterprise). | | NoDefaultPolicy | interface{} | Flag to disable the default policy. | @@ -1325,7 +1325,7 @@ DisplayName *string The display name of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#display_name Token#display_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#display_name Token#display_name} --- @@ -1339,7 +1339,7 @@ ExplicitMaxTtl *string The explicit max TTL of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} --- @@ -1351,7 +1351,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1368,7 +1368,7 @@ Metadata *map[string]*string Metadata to be associated with the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#metadata Token#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#metadata Token#metadata} --- @@ -1382,7 +1382,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#namespace Token#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#namespace Token#namespace} --- @@ -1396,7 +1396,7 @@ NoDefaultPolicy interface{} Flag to disable the default policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_default_policy Token#no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_default_policy Token#no_default_policy} --- @@ -1410,7 +1410,7 @@ NoParent interface{} Flag to create a token without parent. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_parent Token#no_parent} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_parent Token#no_parent} --- @@ -1424,7 +1424,7 @@ NumUses *f64 The number of allowed uses of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#num_uses Token#num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#num_uses Token#num_uses} --- @@ -1438,7 +1438,7 @@ Period *string The period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#period Token#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#period Token#period} --- @@ -1452,7 +1452,7 @@ Policies *[]*string List of policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#policies Token#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#policies Token#policies} --- @@ -1466,7 +1466,7 @@ Renewable interface{} Flag to allow the token to be renewed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renewable Token#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renewable Token#renewable} --- @@ -1480,7 +1480,7 @@ RenewIncrement *f64 The renew increment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_increment Token#renew_increment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_increment Token#renew_increment} --- @@ -1494,7 +1494,7 @@ RenewMinLease *f64 The minimum lease to renew token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_min_lease Token#renew_min_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_min_lease Token#renew_min_lease} --- @@ -1508,7 +1508,7 @@ RoleName *string The token role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#role_name Token#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#role_name Token#role_name} --- @@ -1522,7 +1522,7 @@ Ttl *string The TTL period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#ttl Token#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#ttl Token#ttl} --- @@ -1536,7 +1536,7 @@ WrappingTtl *string The TTL period of the wrapped token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} --- diff --git a/docs/token.java.md b/docs/token.java.md index 6a4f3f18..407f3068 100644 --- a/docs/token.java.md +++ b/docs/token.java.md @@ -4,7 +4,7 @@ ### Token -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token vault_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token vault_token}. #### Initializers @@ -58,7 +58,7 @@ Token.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | displayName | java.lang.String | The display name of the token. | | explicitMaxTtl | java.lang.String | The explicit max TTL of the token. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. | | metadata | java.util.Map | Metadata to be associated with the token. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | noDefaultPolicy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to disable the default policy. | @@ -141,7 +141,7 @@ Must be unique amongst siblings in the same scope The display name of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#display_name Token#display_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#display_name Token#display_name} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The explicit max TTL of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -172,7 +172,7 @@ If you experience problems setting this value it might not be settable. Please t Metadata to be associated with the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#metadata Token#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#metadata Token#metadata} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#namespace Token#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#namespace Token#namespace} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to disable the default policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_default_policy Token#no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_default_policy Token#no_default_policy} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to create a token without parent. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_parent Token#no_parent} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_parent Token#no_parent} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of allowed uses of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#num_uses Token#num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#num_uses Token#num_uses} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#period Token#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#period Token#period} --- @@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#policies Token#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#policies Token#policies} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow the token to be renewed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renewable Token#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renewable Token#renewable} --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The renew increment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_increment Token#renew_increment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_increment Token#renew_increment} --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The minimum lease to renew token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_min_lease Token#renew_min_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_min_lease Token#renew_min_lease} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The token role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#role_name Token#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#role_name Token#role_name} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#ttl Token#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#ttl Token#ttl} --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL period of the wrapped token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} --- @@ -831,7 +831,7 @@ The construct id used in the generated config for the Token to import. The id of the existing Token that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#import import section} in the documentation of this resource for the id to use --- @@ -1487,7 +1487,7 @@ TokenConfig.builder() | provisioners | java.util.List | *No description.* | | displayName | java.lang.String | The display name of the token. | | explicitMaxTtl | java.lang.String | The explicit max TTL of the token. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. | | metadata | java.util.Map | Metadata to be associated with the token. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | noDefaultPolicy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to disable the default policy. | @@ -1584,7 +1584,7 @@ public java.lang.String getDisplayName(); The display name of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#display_name Token#display_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#display_name Token#display_name} --- @@ -1598,7 +1598,7 @@ public java.lang.String getExplicitMaxTtl(); The explicit max TTL of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} --- @@ -1610,7 +1610,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1627,7 +1627,7 @@ public java.util.Map getMetadata(); Metadata to be associated with the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#metadata Token#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#metadata Token#metadata} --- @@ -1641,7 +1641,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#namespace Token#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#namespace Token#namespace} --- @@ -1655,7 +1655,7 @@ public java.lang.Object getNoDefaultPolicy(); Flag to disable the default policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_default_policy Token#no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_default_policy Token#no_default_policy} --- @@ -1669,7 +1669,7 @@ public java.lang.Object getNoParent(); Flag to create a token without parent. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_parent Token#no_parent} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_parent Token#no_parent} --- @@ -1683,7 +1683,7 @@ public java.lang.Number getNumUses(); The number of allowed uses of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#num_uses Token#num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#num_uses Token#num_uses} --- @@ -1697,7 +1697,7 @@ public java.lang.String getPeriod(); The period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#period Token#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#period Token#period} --- @@ -1711,7 +1711,7 @@ public java.util.List getPolicies(); List of policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#policies Token#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#policies Token#policies} --- @@ -1725,7 +1725,7 @@ public java.lang.Object getRenewable(); Flag to allow the token to be renewed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renewable Token#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renewable Token#renewable} --- @@ -1739,7 +1739,7 @@ public java.lang.Number getRenewIncrement(); The renew increment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_increment Token#renew_increment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_increment Token#renew_increment} --- @@ -1753,7 +1753,7 @@ public java.lang.Number getRenewMinLease(); The minimum lease to renew token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_min_lease Token#renew_min_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_min_lease Token#renew_min_lease} --- @@ -1767,7 +1767,7 @@ public java.lang.String getRoleName(); The token role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#role_name Token#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#role_name Token#role_name} --- @@ -1781,7 +1781,7 @@ public java.lang.String getTtl(); The TTL period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#ttl Token#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#ttl Token#ttl} --- @@ -1795,7 +1795,7 @@ public java.lang.String getWrappingTtl(); The TTL period of the wrapped token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} --- diff --git a/docs/token.python.md b/docs/token.python.md index f826efe9..9d32e364 100644 --- a/docs/token.python.md +++ b/docs/token.python.md @@ -4,7 +4,7 @@ ### Token -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token vault_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token vault_token}. #### Initializers @@ -53,7 +53,7 @@ token.Token( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | display_name | str | The display name of the token. | | explicit_max_ttl | str | The explicit max TTL of the token. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. | | metadata | typing.Mapping[str] | Metadata to be associated with the token. | | namespace | str | Target namespace. (requires Enterprise). | | no_default_policy | typing.Union[bool, cdktf.IResolvable] | Flag to disable the default policy. | @@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope The display name of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#display_name Token#display_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#display_name Token#display_name} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The explicit max TTL of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Metadata to be associated with the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#metadata Token#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#metadata Token#metadata} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#namespace Token#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#namespace Token#namespace} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to disable the default policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_default_policy Token#no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_default_policy Token#no_default_policy} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to create a token without parent. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_parent Token#no_parent} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_parent Token#no_parent} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of allowed uses of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#num_uses Token#num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#num_uses Token#num_uses} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#period Token#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#period Token#period} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#policies Token#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#policies Token#policies} --- @@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to allow the token to be renewed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renewable Token#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renewable Token#renewable} --- @@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The renew increment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_increment Token#renew_increment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_increment Token#renew_increment} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The minimum lease to renew token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_min_lease Token#renew_min_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_min_lease Token#renew_min_lease} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The token role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#role_name Token#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#role_name Token#role_name} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#ttl Token#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#ttl Token#ttl} --- @@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL period of the wrapped token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} --- @@ -872,7 +872,7 @@ The construct id used in the generated config for the Token to import. The id of the existing Token that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#import import section} in the documentation of this resource for the id to use --- @@ -1521,7 +1521,7 @@ token.TokenConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | display_name | str | The display name of the token. | | explicit_max_ttl | str | The explicit max TTL of the token. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. | | metadata | typing.Mapping[str] | Metadata to be associated with the token. | | namespace | str | Target namespace. (requires Enterprise). | | no_default_policy | typing.Union[bool, cdktf.IResolvable] | Flag to disable the default policy. | @@ -1618,7 +1618,7 @@ display_name: str The display name of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#display_name Token#display_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#display_name Token#display_name} --- @@ -1632,7 +1632,7 @@ explicit_max_ttl: str The explicit max TTL of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} --- @@ -1644,7 +1644,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1661,7 +1661,7 @@ metadata: typing.Mapping[str] Metadata to be associated with the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#metadata Token#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#metadata Token#metadata} --- @@ -1675,7 +1675,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#namespace Token#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#namespace Token#namespace} --- @@ -1689,7 +1689,7 @@ no_default_policy: typing.Union[bool, IResolvable] Flag to disable the default policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_default_policy Token#no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_default_policy Token#no_default_policy} --- @@ -1703,7 +1703,7 @@ no_parent: typing.Union[bool, IResolvable] Flag to create a token without parent. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_parent Token#no_parent} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_parent Token#no_parent} --- @@ -1717,7 +1717,7 @@ num_uses: typing.Union[int, float] The number of allowed uses of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#num_uses Token#num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#num_uses Token#num_uses} --- @@ -1731,7 +1731,7 @@ period: str The period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#period Token#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#period Token#period} --- @@ -1745,7 +1745,7 @@ policies: typing.List[str] List of policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#policies Token#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#policies Token#policies} --- @@ -1759,7 +1759,7 @@ renewable: typing.Union[bool, IResolvable] Flag to allow the token to be renewed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renewable Token#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renewable Token#renewable} --- @@ -1773,7 +1773,7 @@ renew_increment: typing.Union[int, float] The renew increment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_increment Token#renew_increment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_increment Token#renew_increment} --- @@ -1787,7 +1787,7 @@ renew_min_lease: typing.Union[int, float] The minimum lease to renew token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_min_lease Token#renew_min_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_min_lease Token#renew_min_lease} --- @@ -1801,7 +1801,7 @@ role_name: str The token role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#role_name Token#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#role_name Token#role_name} --- @@ -1815,7 +1815,7 @@ ttl: str The TTL period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#ttl Token#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#ttl Token#ttl} --- @@ -1829,7 +1829,7 @@ wrapping_ttl: str The TTL period of the wrapped token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} --- diff --git a/docs/token.typescript.md b/docs/token.typescript.md index f02e211a..5e7d0ee5 100644 --- a/docs/token.typescript.md +++ b/docs/token.typescript.md @@ -4,7 +4,7 @@ ### Token -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token vault_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token vault_token}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the Token to import. The id of the existing Token that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#import import section} in the documentation of this resource for the id to use --- @@ -1204,7 +1204,7 @@ const tokenConfig: token.TokenConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | displayName | string | The display name of the token. | | explicitMaxTtl | string | The explicit max TTL of the token. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. | | metadata | {[ key: string ]: string} | Metadata to be associated with the token. | | namespace | string | Target namespace. (requires Enterprise). | | noDefaultPolicy | boolean \| cdktf.IResolvable | Flag to disable the default policy. | @@ -1301,7 +1301,7 @@ public readonly displayName: string; The display name of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#display_name Token#display_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#display_name Token#display_name} --- @@ -1315,7 +1315,7 @@ public readonly explicitMaxTtl: string; The explicit max TTL of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} --- @@ -1327,7 +1327,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1344,7 +1344,7 @@ public readonly metadata: {[ key: string ]: string}; Metadata to be associated with the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#metadata Token#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#metadata Token#metadata} --- @@ -1358,7 +1358,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#namespace Token#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#namespace Token#namespace} --- @@ -1372,7 +1372,7 @@ public readonly noDefaultPolicy: boolean | IResolvable; Flag to disable the default policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_default_policy Token#no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_default_policy Token#no_default_policy} --- @@ -1386,7 +1386,7 @@ public readonly noParent: boolean | IResolvable; Flag to create a token without parent. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_parent Token#no_parent} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_parent Token#no_parent} --- @@ -1400,7 +1400,7 @@ public readonly numUses: number; The number of allowed uses of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#num_uses Token#num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#num_uses Token#num_uses} --- @@ -1414,7 +1414,7 @@ public readonly period: string; The period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#period Token#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#period Token#period} --- @@ -1428,7 +1428,7 @@ public readonly policies: string[]; List of policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#policies Token#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#policies Token#policies} --- @@ -1442,7 +1442,7 @@ public readonly renewable: boolean | IResolvable; Flag to allow the token to be renewed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renewable Token#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renewable Token#renewable} --- @@ -1456,7 +1456,7 @@ public readonly renewIncrement: number; The renew increment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_increment Token#renew_increment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_increment Token#renew_increment} --- @@ -1470,7 +1470,7 @@ public readonly renewMinLease: number; The minimum lease to renew token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_min_lease Token#renew_min_lease} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_min_lease Token#renew_min_lease} --- @@ -1484,7 +1484,7 @@ public readonly roleName: string; The token role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#role_name Token#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#role_name Token#role_name} --- @@ -1498,7 +1498,7 @@ public readonly ttl: string; The TTL period of the token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#ttl Token#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#ttl Token#ttl} --- @@ -1512,7 +1512,7 @@ public readonly wrappingTtl: string; The TTL period of the wrapped token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} --- diff --git a/docs/tokenAuthBackendRole.csharp.md b/docs/tokenAuthBackendRole.csharp.md index 46d6ff71..bfbcf72c 100644 --- a/docs/tokenAuthBackendRole.csharp.md +++ b/docs/tokenAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### TokenAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. #### Initializers @@ -600,7 +600,7 @@ The construct id used in the generated config for the TokenAuthBackendRole to im The id of the existing TokenAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1290,7 +1290,7 @@ new TokenAuthBackendRoleConfig { | AllowedPoliciesGlob | string[] | Set of allowed policies with glob match for given role. | | DisallowedPolicies | string[] | List of disallowed policies for given role. | | DisallowedPoliciesGlob | string[] | Set of disallowed policies with glob match for given role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Orphan | object | If true, tokens created against this policy will be orphan tokens. | | PathSuffix | string | Tokens created against this role will have the given suffix as part of their path in addition to the role name. | @@ -1387,7 +1387,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} --- @@ -1401,7 +1401,7 @@ public string[] AllowedEntityAliases { get; set; } Set of allowed entity aliases for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} --- @@ -1415,7 +1415,7 @@ public string[] AllowedPolicies { get; set; } List of allowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} --- @@ -1429,7 +1429,7 @@ public string[] AllowedPoliciesGlob { get; set; } Set of allowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} --- @@ -1443,7 +1443,7 @@ public string[] DisallowedPolicies { get; set; } List of disallowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} --- @@ -1457,7 +1457,7 @@ public string[] DisallowedPoliciesGlob { get; set; } Set of disallowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} --- @@ -1469,7 +1469,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1486,7 +1486,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} --- @@ -1500,7 +1500,7 @@ public object Orphan { get; set; } If true, tokens created against this policy will be orphan tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} --- @@ -1514,7 +1514,7 @@ public string PathSuffix { get; set; } Tokens created against this role will have the given suffix as part of their path in addition to the role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} --- @@ -1528,7 +1528,7 @@ public object Renewable { get; set; } Whether to disable the ability of the token to be renewed past its initial TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} --- @@ -1542,7 +1542,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} --- @@ -1556,7 +1556,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} --- @@ -1570,7 +1570,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} --- @@ -1584,7 +1584,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} --- @@ -1598,7 +1598,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} --- @@ -1612,7 +1612,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} --- @@ -1626,7 +1626,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} --- @@ -1640,7 +1640,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} --- @@ -1654,7 +1654,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} --- diff --git a/docs/tokenAuthBackendRole.go.md b/docs/tokenAuthBackendRole.go.md index c7c6956a..a637f887 100644 --- a/docs/tokenAuthBackendRole.go.md +++ b/docs/tokenAuthBackendRole.go.md @@ -4,12 +4,12 @@ ### TokenAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/tokenauthbackendrole" tokenauthbackendrole.NewTokenAuthBackendRole(scope Construct, id *string, config TokenAuthBackendRoleConfig) TokenAuthBackendRole ``` @@ -511,7 +511,7 @@ func ResetTokenType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/tokenauthbackendrole" tokenauthbackendrole.TokenAuthBackendRole_IsConstruct(x interface{}) *bool ``` @@ -543,7 +543,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/tokenauthbackendrole" tokenauthbackendrole.TokenAuthBackendRole_IsTerraformElement(x interface{}) *bool ``` @@ -557,7 +557,7 @@ tokenauthbackendrole.TokenAuthBackendRole_IsTerraformElement(x interface{}) *boo ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/tokenauthbackendrole" tokenauthbackendrole.TokenAuthBackendRole_IsTerraformResource(x interface{}) *bool ``` @@ -571,7 +571,7 @@ tokenauthbackendrole.TokenAuthBackendRole_IsTerraformResource(x interface{}) *bo ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/tokenauthbackendrole" tokenauthbackendrole.TokenAuthBackendRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -600,7 +600,7 @@ The construct id used in the generated config for the TokenAuthBackendRole to im The id of the existing TokenAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1240,7 +1240,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/tokenauthbackendrole" &tokenauthbackendrole.TokenAuthBackendRoleConfig { Connection: interface{}, @@ -1290,7 +1290,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/tokenauthbackendrole" | AllowedPoliciesGlob | *[]*string | Set of allowed policies with glob match for given role. | | DisallowedPolicies | *[]*string | List of disallowed policies for given role. | | DisallowedPoliciesGlob | *[]*string | Set of disallowed policies with glob match for given role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Orphan | interface{} | If true, tokens created against this policy will be orphan tokens. | | PathSuffix | *string | Tokens created against this role will have the given suffix as part of their path in addition to the role name. | @@ -1387,7 +1387,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} --- @@ -1401,7 +1401,7 @@ AllowedEntityAliases *[]*string Set of allowed entity aliases for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} --- @@ -1415,7 +1415,7 @@ AllowedPolicies *[]*string List of allowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} --- @@ -1429,7 +1429,7 @@ AllowedPoliciesGlob *[]*string Set of allowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} --- @@ -1443,7 +1443,7 @@ DisallowedPolicies *[]*string List of disallowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} --- @@ -1457,7 +1457,7 @@ DisallowedPoliciesGlob *[]*string Set of disallowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} --- @@ -1469,7 +1469,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1486,7 +1486,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} --- @@ -1500,7 +1500,7 @@ Orphan interface{} If true, tokens created against this policy will be orphan tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} --- @@ -1514,7 +1514,7 @@ PathSuffix *string Tokens created against this role will have the given suffix as part of their path in addition to the role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} --- @@ -1528,7 +1528,7 @@ Renewable interface{} Whether to disable the ability of the token to be renewed past its initial TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} --- @@ -1542,7 +1542,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} --- @@ -1556,7 +1556,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} --- @@ -1570,7 +1570,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} --- @@ -1584,7 +1584,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} --- @@ -1598,7 +1598,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} --- @@ -1612,7 +1612,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} --- @@ -1626,7 +1626,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} --- @@ -1640,7 +1640,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} --- @@ -1654,7 +1654,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} --- diff --git a/docs/tokenAuthBackendRole.java.md b/docs/tokenAuthBackendRole.java.md index c034088c..0d704218 100644 --- a/docs/tokenAuthBackendRole.java.md +++ b/docs/tokenAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### TokenAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. #### Initializers @@ -66,7 +66,7 @@ TokenAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | allowedPoliciesGlob | java.util.List | Set of allowed policies with glob match for given role. | | disallowedPolicies | java.util.List | List of disallowed policies for given role. | | disallowedPoliciesGlob | java.util.List | Set of disallowed policies with glob match for given role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | orphan | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, tokens created against this policy will be orphan tokens. | | pathSuffix | java.lang.String | Tokens created against this role will have the given suffix as part of their path in addition to the role name. | @@ -149,7 +149,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of allowed entity aliases for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of allowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of allowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of disallowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of disallowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -220,7 +220,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} --- @@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, tokens created against this policy will be orphan tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} --- @@ -240,7 +240,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Tokens created against this role will have the given suffix as part of their path in addition to the role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} --- @@ -250,7 +250,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to disable the ability of the token to be renewed past its initial TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} --- @@ -260,7 +260,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} --- @@ -270,7 +270,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} --- @@ -280,7 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} --- @@ -290,7 +290,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} --- @@ -300,7 +300,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} --- @@ -310,7 +310,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} --- @@ -320,7 +320,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} --- @@ -330,7 +330,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} --- @@ -340,7 +340,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} --- @@ -900,7 +900,7 @@ The construct id used in the generated config for the TokenAuthBackendRole to im The id of the existing TokenAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1597,7 +1597,7 @@ TokenAuthBackendRoleConfig.builder() | allowedPoliciesGlob | java.util.List | Set of allowed policies with glob match for given role. | | disallowedPolicies | java.util.List | List of disallowed policies for given role. | | disallowedPoliciesGlob | java.util.List | Set of disallowed policies with glob match for given role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | orphan | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, tokens created against this policy will be orphan tokens. | | pathSuffix | java.lang.String | Tokens created against this role will have the given suffix as part of their path in addition to the role name. | @@ -1694,7 +1694,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} --- @@ -1708,7 +1708,7 @@ public java.util.List getAllowedEntityAliases(); Set of allowed entity aliases for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} --- @@ -1722,7 +1722,7 @@ public java.util.List getAllowedPolicies(); List of allowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} --- @@ -1736,7 +1736,7 @@ public java.util.List getAllowedPoliciesGlob(); Set of allowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} --- @@ -1750,7 +1750,7 @@ public java.util.List getDisallowedPolicies(); List of disallowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} --- @@ -1764,7 +1764,7 @@ public java.util.List getDisallowedPoliciesGlob(); Set of disallowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} --- @@ -1776,7 +1776,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1793,7 +1793,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} --- @@ -1807,7 +1807,7 @@ public java.lang.Object getOrphan(); If true, tokens created against this policy will be orphan tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} --- @@ -1821,7 +1821,7 @@ public java.lang.String getPathSuffix(); Tokens created against this role will have the given suffix as part of their path in addition to the role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} --- @@ -1835,7 +1835,7 @@ public java.lang.Object getRenewable(); Whether to disable the ability of the token to be renewed past its initial TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} --- @@ -1849,7 +1849,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} --- @@ -1863,7 +1863,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} --- @@ -1877,7 +1877,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} --- @@ -1891,7 +1891,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} --- @@ -1905,7 +1905,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} --- @@ -1919,7 +1919,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} --- @@ -1933,7 +1933,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} --- @@ -1947,7 +1947,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} --- @@ -1961,7 +1961,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} --- diff --git a/docs/tokenAuthBackendRole.python.md b/docs/tokenAuthBackendRole.python.md index 7c4045ea..485e9271 100644 --- a/docs/tokenAuthBackendRole.python.md +++ b/docs/tokenAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### TokenAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. #### Initializers @@ -61,7 +61,7 @@ tokenAuthBackendRole.TokenAuthBackendRole( | allowed_policies_glob | typing.List[str] | Set of allowed policies with glob match for given role. | | disallowed_policies | typing.List[str] | List of disallowed policies for given role. | | disallowed_policies_glob | typing.List[str] | Set of disallowed policies with glob match for given role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | orphan | typing.Union[bool, cdktf.IResolvable] | If true, tokens created against this policy will be orphan tokens. | | path_suffix | str | Tokens created against this role will have the given suffix as part of their path in addition to the role name. | @@ -144,7 +144,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of allowed entity aliases for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of allowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of allowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of disallowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of disallowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -215,7 +215,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, tokens created against this policy will be orphan tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Tokens created against this role will have the given suffix as part of their path in addition to the role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to disable the ability of the token to be renewed past its initial TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} --- @@ -305,7 +305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} --- @@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} --- @@ -325,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} --- @@ -335,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} --- @@ -941,7 +941,7 @@ The construct id used in the generated config for the TokenAuthBackendRole to im The id of the existing TokenAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1631,7 +1631,7 @@ tokenAuthBackendRole.TokenAuthBackendRoleConfig( | allowed_policies_glob | typing.List[str] | Set of allowed policies with glob match for given role. | | disallowed_policies | typing.List[str] | List of disallowed policies for given role. | | disallowed_policies_glob | typing.List[str] | Set of disallowed policies with glob match for given role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | orphan | typing.Union[bool, cdktf.IResolvable] | If true, tokens created against this policy will be orphan tokens. | | path_suffix | str | Tokens created against this role will have the given suffix as part of their path in addition to the role name. | @@ -1728,7 +1728,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} --- @@ -1742,7 +1742,7 @@ allowed_entity_aliases: typing.List[str] Set of allowed entity aliases for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} --- @@ -1756,7 +1756,7 @@ allowed_policies: typing.List[str] List of allowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} --- @@ -1770,7 +1770,7 @@ allowed_policies_glob: typing.List[str] Set of allowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} --- @@ -1784,7 +1784,7 @@ disallowed_policies: typing.List[str] List of disallowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} --- @@ -1798,7 +1798,7 @@ disallowed_policies_glob: typing.List[str] Set of disallowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} --- @@ -1810,7 +1810,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1827,7 +1827,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} --- @@ -1841,7 +1841,7 @@ orphan: typing.Union[bool, IResolvable] If true, tokens created against this policy will be orphan tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} --- @@ -1855,7 +1855,7 @@ path_suffix: str Tokens created against this role will have the given suffix as part of their path in addition to the role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} --- @@ -1869,7 +1869,7 @@ renewable: typing.Union[bool, IResolvable] Whether to disable the ability of the token to be renewed past its initial TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} --- @@ -1883,7 +1883,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} --- @@ -1897,7 +1897,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} --- @@ -1911,7 +1911,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} --- @@ -1925,7 +1925,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} --- @@ -1939,7 +1939,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} --- @@ -1953,7 +1953,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} --- @@ -1967,7 +1967,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} --- @@ -1981,7 +1981,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} --- @@ -1995,7 +1995,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} --- diff --git a/docs/tokenAuthBackendRole.typescript.md b/docs/tokenAuthBackendRole.typescript.md index c056761d..b11f26f1 100644 --- a/docs/tokenAuthBackendRole.typescript.md +++ b/docs/tokenAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### TokenAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role}. #### Initializers @@ -600,7 +600,7 @@ The construct id used in the generated config for the TokenAuthBackendRole to im The id of the existing TokenAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1262,7 +1262,7 @@ const tokenAuthBackendRoleConfig: tokenAuthBackendRole.TokenAuthBackendRoleConfi | allowedPoliciesGlob | string[] | Set of allowed policies with glob match for given role. | | disallowedPolicies | string[] | List of disallowed policies for given role. | | disallowedPoliciesGlob | string[] | Set of disallowed policies with glob match for given role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | orphan | boolean \| cdktf.IResolvable | If true, tokens created against this policy will be orphan tokens. | | pathSuffix | string | Tokens created against this role will have the given suffix as part of their path in addition to the role name. | @@ -1359,7 +1359,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} --- @@ -1373,7 +1373,7 @@ public readonly allowedEntityAliases: string[]; Set of allowed entity aliases for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} --- @@ -1387,7 +1387,7 @@ public readonly allowedPolicies: string[]; List of allowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} --- @@ -1401,7 +1401,7 @@ public readonly allowedPoliciesGlob: string[]; Set of allowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} --- @@ -1415,7 +1415,7 @@ public readonly disallowedPolicies: string[]; List of disallowed policies for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} --- @@ -1429,7 +1429,7 @@ public readonly disallowedPoliciesGlob: string[]; Set of disallowed policies with glob match for given role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} --- @@ -1441,7 +1441,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1458,7 +1458,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} --- @@ -1472,7 +1472,7 @@ public readonly orphan: boolean | IResolvable; If true, tokens created against this policy will be orphan tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} --- @@ -1486,7 +1486,7 @@ public readonly pathSuffix: string; Tokens created against this role will have the given suffix as part of their path in addition to the role name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} --- @@ -1500,7 +1500,7 @@ public readonly renewable: boolean | IResolvable; Whether to disable the ability of the token to be renewed past its initial TTL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} --- @@ -1514,7 +1514,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} --- @@ -1528,7 +1528,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} --- @@ -1542,7 +1542,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} --- @@ -1556,7 +1556,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} --- @@ -1570,7 +1570,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} --- @@ -1584,7 +1584,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} --- @@ -1598,7 +1598,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} --- @@ -1612,7 +1612,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} --- @@ -1626,7 +1626,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} --- diff --git a/docs/transformAlphabet.csharp.md b/docs/transformAlphabet.csharp.md index ea24022a..dd205b3d 100644 --- a/docs/transformAlphabet.csharp.md +++ b/docs/transformAlphabet.csharp.md @@ -4,7 +4,7 @@ ### TransformAlphabet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet vault_transform_alphabet}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet vault_transform_alphabet}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the TransformAlphabet to impor The id of the existing TransformAlphabet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ new TransformAlphabetConfig { | Name | string | The name of the alphabet. | | Path | string | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | Alphabet | string | A string of characters that contains the alphabet set. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ public string Name { get; set; } The name of the alphabet. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#name TransformAlphabet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#name TransformAlphabet#name} --- @@ -929,7 +929,7 @@ public string Path { get; set; } The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#path TransformAlphabet#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#path TransformAlphabet#path} --- @@ -943,7 +943,7 @@ public string Alphabet { get; set; } A string of characters that contains the alphabet set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} --- @@ -955,7 +955,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} --- diff --git a/docs/transformAlphabet.go.md b/docs/transformAlphabet.go.md index 4c4fad82..aeb068b4 100644 --- a/docs/transformAlphabet.go.md +++ b/docs/transformAlphabet.go.md @@ -4,12 +4,12 @@ ### TransformAlphabet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet vault_transform_alphabet}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet vault_transform_alphabet}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformalphabet" transformalphabet.NewTransformAlphabet(scope Construct, id *string, config TransformAlphabetConfig) TransformAlphabet ``` @@ -399,7 +399,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformalphabet" transformalphabet.TransformAlphabet_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformalphabet" transformalphabet.TransformAlphabet_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ transformalphabet.TransformAlphabet_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformalphabet" transformalphabet.TransformAlphabet_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ transformalphabet.TransformAlphabet_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformalphabet" transformalphabet.TransformAlphabet_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the TransformAlphabet to impor The id of the existing TransformAlphabet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use --- @@ -798,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformalphabet" &transformalphabet.TransformAlphabetConfig { Connection: interface{}, @@ -830,7 +830,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformalphabet" | Name | *string | The name of the alphabet. | | Path | *string | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | Alphabet | *string | A string of characters that contains the alphabet set. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ Name *string The name of the alphabet. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#name TransformAlphabet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#name TransformAlphabet#name} --- @@ -929,7 +929,7 @@ Path *string The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#path TransformAlphabet#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#path TransformAlphabet#path} --- @@ -943,7 +943,7 @@ Alphabet *string A string of characters that contains the alphabet set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} --- @@ -955,7 +955,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} --- diff --git a/docs/transformAlphabet.java.md b/docs/transformAlphabet.java.md index 89a30c85..a1942a44 100644 --- a/docs/transformAlphabet.java.md +++ b/docs/transformAlphabet.java.md @@ -4,7 +4,7 @@ ### TransformAlphabet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet vault_transform_alphabet}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet vault_transform_alphabet}. #### Initializers @@ -45,7 +45,7 @@ TransformAlphabet.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the alphabet. | | path | java.lang.String | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | alphabet | java.lang.String | A string of characters that contains the alphabet set. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The name of the alphabet. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#name TransformAlphabet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#name TransformAlphabet#name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#path TransformAlphabet#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#path TransformAlphabet#path} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A string of characters that contains the alphabet set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} --- @@ -605,7 +605,7 @@ The construct id used in the generated config for the TransformAlphabet to impor The id of the existing TransformAlphabet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use --- @@ -951,7 +951,7 @@ TransformAlphabetConfig.builder() | name | java.lang.String | The name of the alphabet. | | path | java.lang.String | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | alphabet | java.lang.String | A string of characters that contains the alphabet set. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1036,7 +1036,7 @@ public java.lang.String getName(); The name of the alphabet. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#name TransformAlphabet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#name TransformAlphabet#name} --- @@ -1050,7 +1050,7 @@ public java.lang.String getPath(); The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#path TransformAlphabet#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#path TransformAlphabet#path} --- @@ -1064,7 +1064,7 @@ public java.lang.String getAlphabet(); A string of characters that contains the alphabet set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} --- @@ -1076,7 +1076,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1093,7 +1093,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} --- diff --git a/docs/transformAlphabet.python.md b/docs/transformAlphabet.python.md index 72d856e6..a9382da3 100644 --- a/docs/transformAlphabet.python.md +++ b/docs/transformAlphabet.python.md @@ -4,7 +4,7 @@ ### TransformAlphabet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet vault_transform_alphabet}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet vault_transform_alphabet}. #### Initializers @@ -43,7 +43,7 @@ transformAlphabet.TransformAlphabet( | name | str | The name of the alphabet. | | path | str | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | alphabet | str | A string of characters that contains the alphabet set. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The name of the alphabet. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#name TransformAlphabet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#name TransformAlphabet#name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#path TransformAlphabet#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#path TransformAlphabet#path} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A string of characters that contains the alphabet set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the TransformAlphabet to impor The id of the existing TransformAlphabet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use --- @@ -991,7 +991,7 @@ transformAlphabet.TransformAlphabetConfig( | name | str | The name of the alphabet. | | path | str | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | alphabet | str | A string of characters that contains the alphabet set. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1076,7 +1076,7 @@ name: str The name of the alphabet. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#name TransformAlphabet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#name TransformAlphabet#name} --- @@ -1090,7 +1090,7 @@ path: str The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#path TransformAlphabet#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#path TransformAlphabet#path} --- @@ -1104,7 +1104,7 @@ alphabet: str A string of characters that contains the alphabet set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} --- @@ -1116,7 +1116,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1133,7 +1133,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} --- diff --git a/docs/transformAlphabet.typescript.md b/docs/transformAlphabet.typescript.md index e4219c04..4e3262c8 100644 --- a/docs/transformAlphabet.typescript.md +++ b/docs/transformAlphabet.typescript.md @@ -4,7 +4,7 @@ ### TransformAlphabet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet vault_transform_alphabet}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet vault_transform_alphabet}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the TransformAlphabet to impor The id of the existing TransformAlphabet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use --- @@ -817,7 +817,7 @@ const transformAlphabetConfig: transformAlphabet.TransformAlphabetConfig = { ... | name | string | The name of the alphabet. | | path | string | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | alphabet | string | A string of characters that contains the alphabet set. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -902,7 +902,7 @@ public readonly name: string; The name of the alphabet. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#name TransformAlphabet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#name TransformAlphabet#name} --- @@ -916,7 +916,7 @@ public readonly path: string; The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#path TransformAlphabet#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#path TransformAlphabet#path} --- @@ -930,7 +930,7 @@ public readonly alphabet: string; A string of characters that contains the alphabet set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} --- @@ -942,7 +942,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -959,7 +959,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} --- diff --git a/docs/transformRole.csharp.md b/docs/transformRole.csharp.md index a4c49406..8929dfb9 100644 --- a/docs/transformRole.csharp.md +++ b/docs/transformRole.csharp.md @@ -4,7 +4,7 @@ ### TransformRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role vault_transform_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role vault_transform_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the TransformRole to import. The id of the existing TransformRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use --- @@ -829,7 +829,7 @@ new TransformRoleConfig { | Provisioners | object[] | *No description.* | | Name | string | The name of the role. | | Path | string | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Transformations | string[] | A comma separated string or slice of transformations to use. | @@ -915,7 +915,7 @@ public string Name { get; set; } The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#name TransformRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#name TransformRole#name} --- @@ -929,7 +929,7 @@ public string Path { get; set; } The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#path TransformRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#path TransformRole#path} --- @@ -941,7 +941,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -958,7 +958,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#namespace TransformRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#namespace TransformRole#namespace} --- @@ -972,7 +972,7 @@ public string[] Transformations { get; set; } A comma separated string or slice of transformations to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#transformations TransformRole#transformations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#transformations TransformRole#transformations} --- diff --git a/docs/transformRole.go.md b/docs/transformRole.go.md index 0bd4c4c4..ade1fb3b 100644 --- a/docs/transformRole.go.md +++ b/docs/transformRole.go.md @@ -4,12 +4,12 @@ ### TransformRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role vault_transform_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role vault_transform_role}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformrole" transformrole.NewTransformRole(scope Construct, id *string, config TransformRoleConfig) TransformRole ``` @@ -399,7 +399,7 @@ func ResetTransformations() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformrole" transformrole.TransformRole_IsConstruct(x interface{}) *bool ``` @@ -431,7 +431,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformrole" transformrole.TransformRole_IsTerraformElement(x interface{}) *bool ``` @@ -445,7 +445,7 @@ transformrole.TransformRole_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformrole" transformrole.TransformRole_IsTerraformResource(x interface{}) *bool ``` @@ -459,7 +459,7 @@ transformrole.TransformRole_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformrole" transformrole.TransformRole_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -488,7 +488,7 @@ The construct id used in the generated config for the TransformRole to import. The id of the existing TransformRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use --- @@ -798,7 +798,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformrole" &transformrole.TransformRoleConfig { Connection: interface{}, @@ -829,7 +829,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformrole" | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the role. | | Path | *string | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Transformations | *[]*string | A comma separated string or slice of transformations to use. | @@ -915,7 +915,7 @@ Name *string The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#name TransformRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#name TransformRole#name} --- @@ -929,7 +929,7 @@ Path *string The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#path TransformRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#path TransformRole#path} --- @@ -941,7 +941,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -958,7 +958,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#namespace TransformRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#namespace TransformRole#namespace} --- @@ -972,7 +972,7 @@ Transformations *[]*string A comma separated string or slice of transformations to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#transformations TransformRole#transformations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#transformations TransformRole#transformations} --- diff --git a/docs/transformRole.java.md b/docs/transformRole.java.md index 1466809d..d73a58f3 100644 --- a/docs/transformRole.java.md +++ b/docs/transformRole.java.md @@ -4,7 +4,7 @@ ### TransformRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role vault_transform_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role vault_transform_role}. #### Initializers @@ -44,7 +44,7 @@ TransformRole.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the role. | | path | java.lang.String | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformations | java.util.List | A comma separated string or slice of transformations to use. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#name TransformRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#name TransformRole#name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#path TransformRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#path TransformRole#path} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#namespace TransformRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#namespace TransformRole#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A comma separated string or slice of transformations to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#transformations TransformRole#transformations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#transformations TransformRole#transformations} --- @@ -605,7 +605,7 @@ The construct id used in the generated config for the TransformRole to import. The id of the existing TransformRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use --- @@ -950,7 +950,7 @@ TransformRoleConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the role. | | path | java.lang.String | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformations | java.util.List | A comma separated string or slice of transformations to use. | @@ -1036,7 +1036,7 @@ public java.lang.String getName(); The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#name TransformRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#name TransformRole#name} --- @@ -1050,7 +1050,7 @@ public java.lang.String getPath(); The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#path TransformRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#path TransformRole#path} --- @@ -1062,7 +1062,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1079,7 +1079,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#namespace TransformRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#namespace TransformRole#namespace} --- @@ -1093,7 +1093,7 @@ public java.util.List getTransformations(); A comma separated string or slice of transformations to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#transformations TransformRole#transformations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#transformations TransformRole#transformations} --- diff --git a/docs/transformRole.python.md b/docs/transformRole.python.md index 72b96583..5b1d704c 100644 --- a/docs/transformRole.python.md +++ b/docs/transformRole.python.md @@ -4,7 +4,7 @@ ### TransformRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role vault_transform_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role vault_transform_role}. #### Initializers @@ -42,7 +42,7 @@ transformRole.TransformRole( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the role. | | path | str | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformations | typing.List[str] | A comma separated string or slice of transformations to use. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#name TransformRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#name TransformRole#name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#path TransformRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#path TransformRole#path} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#namespace TransformRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#namespace TransformRole#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A comma separated string or slice of transformations to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#transformations TransformRole#transformations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#transformations TransformRole#transformations} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the TransformRole to import. The id of the existing TransformRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use --- @@ -990,7 +990,7 @@ transformRole.TransformRoleConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the role. | | path | str | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformations | typing.List[str] | A comma separated string or slice of transformations to use. | @@ -1076,7 +1076,7 @@ name: str The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#name TransformRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#name TransformRole#name} --- @@ -1090,7 +1090,7 @@ path: str The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#path TransformRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#path TransformRole#path} --- @@ -1102,7 +1102,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1119,7 +1119,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#namespace TransformRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#namespace TransformRole#namespace} --- @@ -1133,7 +1133,7 @@ transformations: typing.List[str] A comma separated string or slice of transformations to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#transformations TransformRole#transformations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#transformations TransformRole#transformations} --- diff --git a/docs/transformRole.typescript.md b/docs/transformRole.typescript.md index ad336c02..7440786f 100644 --- a/docs/transformRole.typescript.md +++ b/docs/transformRole.typescript.md @@ -4,7 +4,7 @@ ### TransformRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role vault_transform_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role vault_transform_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the TransformRole to import. The id of the existing TransformRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use --- @@ -816,7 +816,7 @@ const transformRoleConfig: transformRole.TransformRoleConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the role. | | path | string | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | transformations | string[] | A comma separated string or slice of transformations to use. | @@ -902,7 +902,7 @@ public readonly name: string; The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#name TransformRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#name TransformRole#name} --- @@ -916,7 +916,7 @@ public readonly path: string; The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#path TransformRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#path TransformRole#path} --- @@ -928,7 +928,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -945,7 +945,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#namespace TransformRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#namespace TransformRole#namespace} --- @@ -959,7 +959,7 @@ public readonly transformations: string[]; A comma separated string or slice of transformations to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#transformations TransformRole#transformations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#transformations TransformRole#transformations} --- diff --git a/docs/transformTemplate.csharp.md b/docs/transformTemplate.csharp.md index d7534407..af258942 100644 --- a/docs/transformTemplate.csharp.md +++ b/docs/transformTemplate.csharp.md @@ -4,7 +4,7 @@ ### TransformTemplate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template vault_transform_template}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template vault_transform_template}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the TransformTemplate to impor The id of the existing TransformTemplate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use --- @@ -952,7 +952,7 @@ new TransformTemplateConfig { | Alphabet | string | The alphabet to use for this template. This is only used during FPE transformations. | | DecodeFormats | System.Collections.Generic.IDictionary | The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. | | EncodeFormat | string | The regular expression template used for encoding values. Only applicable to FPE transformations. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Pattern | string | The pattern used for matching. Currently, only regular expression pattern is supported. | | Type | string | The pattern type to use for match detection. Currently, only regex is supported. | @@ -1039,7 +1039,7 @@ public string Name { get; set; } The name of the template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#name TransformTemplate#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#name TransformTemplate#name} --- @@ -1053,7 +1053,7 @@ public string Path { get; set; } The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#path TransformTemplate#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#path TransformTemplate#path} --- @@ -1067,7 +1067,7 @@ public string Alphabet { get; set; } The alphabet to use for this template. This is only used during FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} --- @@ -1081,7 +1081,7 @@ public System.Collections.Generic.IDictionary DecodeFormats { ge The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} --- @@ -1095,7 +1095,7 @@ public string EncodeFormat { get; set; } The regular expression template used for encoding values. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} --- @@ -1107,7 +1107,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1124,7 +1124,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#namespace TransformTemplate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#namespace TransformTemplate#namespace} --- @@ -1138,7 +1138,7 @@ public string Pattern { get; set; } The pattern used for matching. Currently, only regular expression pattern is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#pattern TransformTemplate#pattern} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#pattern TransformTemplate#pattern} --- @@ -1152,7 +1152,7 @@ public string Type { get; set; } The pattern type to use for match detection. Currently, only regex is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#type TransformTemplate#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#type TransformTemplate#type} --- diff --git a/docs/transformTemplate.go.md b/docs/transformTemplate.go.md index ca1aa1f3..11dbebe2 100644 --- a/docs/transformTemplate.go.md +++ b/docs/transformTemplate.go.md @@ -4,12 +4,12 @@ ### TransformTemplate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template vault_transform_template}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template vault_transform_template}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtemplate" transformtemplate.NewTransformTemplate(scope Construct, id *string, config TransformTemplateConfig) TransformTemplate ``` @@ -427,7 +427,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtemplate" transformtemplate.TransformTemplate_IsConstruct(x interface{}) *bool ``` @@ -459,7 +459,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtemplate" transformtemplate.TransformTemplate_IsTerraformElement(x interface{}) *bool ``` @@ -473,7 +473,7 @@ transformtemplate.TransformTemplate_IsTerraformElement(x interface{}) *bool ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtemplate" transformtemplate.TransformTemplate_IsTerraformResource(x interface{}) *bool ``` @@ -487,7 +487,7 @@ transformtemplate.TransformTemplate_IsTerraformResource(x interface{}) *bool ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtemplate" transformtemplate.TransformTemplate_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -516,7 +516,7 @@ The construct id used in the generated config for the TransformTemplate to impor The id of the existing TransformTemplate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtemplate" &transformtemplate.TransformTemplateConfig { Connection: interface{}, @@ -952,7 +952,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtemplate" | Alphabet | *string | The alphabet to use for this template. This is only used during FPE transformations. | | DecodeFormats | *map[string]*string | The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. | | EncodeFormat | *string | The regular expression template used for encoding values. Only applicable to FPE transformations. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Pattern | *string | The pattern used for matching. Currently, only regular expression pattern is supported. | | Type | *string | The pattern type to use for match detection. Currently, only regex is supported. | @@ -1039,7 +1039,7 @@ Name *string The name of the template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#name TransformTemplate#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#name TransformTemplate#name} --- @@ -1053,7 +1053,7 @@ Path *string The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#path TransformTemplate#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#path TransformTemplate#path} --- @@ -1067,7 +1067,7 @@ Alphabet *string The alphabet to use for this template. This is only used during FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} --- @@ -1081,7 +1081,7 @@ DecodeFormats *map[string]*string The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} --- @@ -1095,7 +1095,7 @@ EncodeFormat *string The regular expression template used for encoding values. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} --- @@ -1107,7 +1107,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1124,7 +1124,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#namespace TransformTemplate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#namespace TransformTemplate#namespace} --- @@ -1138,7 +1138,7 @@ Pattern *string The pattern used for matching. Currently, only regular expression pattern is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#pattern TransformTemplate#pattern} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#pattern TransformTemplate#pattern} --- @@ -1152,7 +1152,7 @@ Type *string The pattern type to use for match detection. Currently, only regex is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#type TransformTemplate#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#type TransformTemplate#type} --- diff --git a/docs/transformTemplate.java.md b/docs/transformTemplate.java.md index 18ebe495..3317ccd3 100644 --- a/docs/transformTemplate.java.md +++ b/docs/transformTemplate.java.md @@ -4,7 +4,7 @@ ### TransformTemplate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template vault_transform_template}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template vault_transform_template}. #### Initializers @@ -51,7 +51,7 @@ TransformTemplate.Builder.create(Construct scope, java.lang.String id) | alphabet | java.lang.String | The alphabet to use for this template. This is only used during FPE transformations. | | decodeFormats | java.util.Map | The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. | | encodeFormat | java.lang.String | The regular expression template used for encoding values. Only applicable to FPE transformations. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pattern | java.lang.String | The pattern used for matching. Currently, only regular expression pattern is supported. | | type | java.lang.String | The pattern type to use for match detection. Currently, only regex is supported. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The name of the template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#name TransformTemplate#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#name TransformTemplate#name} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#path TransformTemplate#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#path TransformTemplate#path} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The alphabet to use for this template. This is only used during FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The regular expression template used for encoding values. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -185,7 +185,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#namespace TransformTemplate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#namespace TransformTemplate#namespace} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pattern used for matching. Currently, only regular expression pattern is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#pattern TransformTemplate#pattern} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#pattern TransformTemplate#pattern} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pattern type to use for match detection. Currently, only regex is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#type TransformTemplate#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#type TransformTemplate#type} --- @@ -681,7 +681,7 @@ The construct id used in the generated config for the TransformTemplate to impor The id of the existing TransformTemplate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use --- @@ -1121,7 +1121,7 @@ TransformTemplateConfig.builder() | alphabet | java.lang.String | The alphabet to use for this template. This is only used during FPE transformations. | | decodeFormats | java.util.Map | The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. | | encodeFormat | java.lang.String | The regular expression template used for encoding values. Only applicable to FPE transformations. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pattern | java.lang.String | The pattern used for matching. Currently, only regular expression pattern is supported. | | type | java.lang.String | The pattern type to use for match detection. Currently, only regex is supported. | @@ -1208,7 +1208,7 @@ public java.lang.String getName(); The name of the template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#name TransformTemplate#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#name TransformTemplate#name} --- @@ -1222,7 +1222,7 @@ public java.lang.String getPath(); The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#path TransformTemplate#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#path TransformTemplate#path} --- @@ -1236,7 +1236,7 @@ public java.lang.String getAlphabet(); The alphabet to use for this template. This is only used during FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} --- @@ -1250,7 +1250,7 @@ public java.util.Map getDecodeFormats(); The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} --- @@ -1264,7 +1264,7 @@ public java.lang.String getEncodeFormat(); The regular expression template used for encoding values. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} --- @@ -1276,7 +1276,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1293,7 +1293,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#namespace TransformTemplate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#namespace TransformTemplate#namespace} --- @@ -1307,7 +1307,7 @@ public java.lang.String getPattern(); The pattern used for matching. Currently, only regular expression pattern is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#pattern TransformTemplate#pattern} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#pattern TransformTemplate#pattern} --- @@ -1321,7 +1321,7 @@ public java.lang.String getType(); The pattern type to use for match detection. Currently, only regex is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#type TransformTemplate#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#type TransformTemplate#type} --- diff --git a/docs/transformTemplate.python.md b/docs/transformTemplate.python.md index e2f9e1f9..3ccca945 100644 --- a/docs/transformTemplate.python.md +++ b/docs/transformTemplate.python.md @@ -4,7 +4,7 @@ ### TransformTemplate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template vault_transform_template}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template vault_transform_template}. #### Initializers @@ -49,7 +49,7 @@ transformTemplate.TransformTemplate( | alphabet | str | The alphabet to use for this template. This is only used during FPE transformations. | | decode_formats | typing.Mapping[str] | The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. | | encode_format | str | The regular expression template used for encoding values. Only applicable to FPE transformations. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. | | namespace | str | Target namespace. (requires Enterprise). | | pattern | str | The pattern used for matching. Currently, only regular expression pattern is supported. | | type | str | The pattern type to use for match detection. Currently, only regex is supported. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope The name of the template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#name TransformTemplate#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#name TransformTemplate#name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#path TransformTemplate#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#path TransformTemplate#path} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The alphabet to use for this template. This is only used during FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The regular expression template used for encoding values. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -183,7 +183,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#namespace TransformTemplate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#namespace TransformTemplate#namespace} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pattern used for matching. Currently, only regular expression pattern is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#pattern TransformTemplate#pattern} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#pattern TransformTemplate#pattern} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pattern type to use for match detection. Currently, only regex is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#type TransformTemplate#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#type TransformTemplate#type} --- @@ -725,7 +725,7 @@ The construct id used in the generated config for the TransformTemplate to impor The id of the existing TransformTemplate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use --- @@ -1161,7 +1161,7 @@ transformTemplate.TransformTemplateConfig( | alphabet | str | The alphabet to use for this template. This is only used during FPE transformations. | | decode_formats | typing.Mapping[str] | The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. | | encode_format | str | The regular expression template used for encoding values. Only applicable to FPE transformations. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. | | namespace | str | Target namespace. (requires Enterprise). | | pattern | str | The pattern used for matching. Currently, only regular expression pattern is supported. | | type | str | The pattern type to use for match detection. Currently, only regex is supported. | @@ -1248,7 +1248,7 @@ name: str The name of the template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#name TransformTemplate#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#name TransformTemplate#name} --- @@ -1262,7 +1262,7 @@ path: str The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#path TransformTemplate#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#path TransformTemplate#path} --- @@ -1276,7 +1276,7 @@ alphabet: str The alphabet to use for this template. This is only used during FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} --- @@ -1290,7 +1290,7 @@ decode_formats: typing.Mapping[str] The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} --- @@ -1304,7 +1304,7 @@ encode_format: str The regular expression template used for encoding values. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} --- @@ -1316,7 +1316,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1333,7 +1333,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#namespace TransformTemplate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#namespace TransformTemplate#namespace} --- @@ -1347,7 +1347,7 @@ pattern: str The pattern used for matching. Currently, only regular expression pattern is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#pattern TransformTemplate#pattern} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#pattern TransformTemplate#pattern} --- @@ -1361,7 +1361,7 @@ type: str The pattern type to use for match detection. Currently, only regex is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#type TransformTemplate#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#type TransformTemplate#type} --- diff --git a/docs/transformTemplate.typescript.md b/docs/transformTemplate.typescript.md index 4ddff8c6..1b5f2c47 100644 --- a/docs/transformTemplate.typescript.md +++ b/docs/transformTemplate.typescript.md @@ -4,7 +4,7 @@ ### TransformTemplate -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template vault_transform_template}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template vault_transform_template}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the TransformTemplate to impor The id of the existing TransformTemplate that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use --- @@ -935,7 +935,7 @@ const transformTemplateConfig: transformTemplate.TransformTemplateConfig = { ... | alphabet | string | The alphabet to use for this template. This is only used during FPE transformations. | | decodeFormats | {[ key: string ]: string} | The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. | | encodeFormat | string | The regular expression template used for encoding values. Only applicable to FPE transformations. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. | | namespace | string | Target namespace. (requires Enterprise). | | pattern | string | The pattern used for matching. Currently, only regular expression pattern is supported. | | type | string | The pattern type to use for match detection. Currently, only regex is supported. | @@ -1022,7 +1022,7 @@ public readonly name: string; The name of the template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#name TransformTemplate#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#name TransformTemplate#name} --- @@ -1036,7 +1036,7 @@ public readonly path: string; The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#path TransformTemplate#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#path TransformTemplate#path} --- @@ -1050,7 +1050,7 @@ public readonly alphabet: string; The alphabet to use for this template. This is only used during FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} --- @@ -1064,7 +1064,7 @@ public readonly decodeFormats: {[ key: string ]: string}; The map of regular expression templates used to customize decoded outputs. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} --- @@ -1078,7 +1078,7 @@ public readonly encodeFormat: string; The regular expression template used for encoding values. Only applicable to FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} --- @@ -1090,7 +1090,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1107,7 +1107,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#namespace TransformTemplate#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#namespace TransformTemplate#namespace} --- @@ -1121,7 +1121,7 @@ public readonly pattern: string; The pattern used for matching. Currently, only regular expression pattern is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#pattern TransformTemplate#pattern} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#pattern TransformTemplate#pattern} --- @@ -1135,7 +1135,7 @@ public readonly type: string; The pattern type to use for match detection. Currently, only regex is supported. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#type TransformTemplate#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#type TransformTemplate#type} --- diff --git a/docs/transformTransformation.csharp.md b/docs/transformTransformation.csharp.md index eeef9550..3461c16a 100644 --- a/docs/transformTransformation.csharp.md +++ b/docs/transformTransformation.csharp.md @@ -4,7 +4,7 @@ ### TransformTransformation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation vault_transform_transformation}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation vault_transform_transformation}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the TransformTransformation to The id of the existing TransformTransformation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use --- @@ -1011,7 +1011,7 @@ new TransformTransformationConfig { | Path | string | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | AllowedRoles | string[] | The set of roles allowed to perform this transformation. | | DeletionAllowed | object | If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. | | MaskingCharacter | string | The character used to replace data when in masking mode. | | Namespace | string | Target namespace. (requires Enterprise). | | Template | string | The name of the template to use. | @@ -1101,7 +1101,7 @@ public string Name { get; set; } The name of the transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#name TransformTransformation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#name TransformTransformation#name} --- @@ -1115,7 +1115,7 @@ public string Path { get; set; } The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#path TransformTransformation#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#path TransformTransformation#path} --- @@ -1129,7 +1129,7 @@ public string[] AllowedRoles { get; set; } The set of roles allowed to perform this transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} --- @@ -1143,7 +1143,7 @@ public object DeletionAllowed { get; set; } If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} --- @@ -1155,7 +1155,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1172,7 +1172,7 @@ public string MaskingCharacter { get; set; } The character used to replace data when in masking mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} --- @@ -1186,7 +1186,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} --- @@ -1200,7 +1200,7 @@ public string Template { get; set; } The name of the template to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#template TransformTransformation#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#template TransformTransformation#template} --- @@ -1214,7 +1214,7 @@ public string[] Templates { get; set; } Templates configured for transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#templates TransformTransformation#templates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#templates TransformTransformation#templates} --- @@ -1228,7 +1228,7 @@ public string TweakSource { get; set; } The source of where the tweak value comes from. Only valid when in FPE mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} --- @@ -1242,7 +1242,7 @@ public string Type { get; set; } The type of transformation to perform. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#type TransformTransformation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#type TransformTransformation#type} --- diff --git a/docs/transformTransformation.go.md b/docs/transformTransformation.go.md index 07825ff2..a410362e 100644 --- a/docs/transformTransformation.go.md +++ b/docs/transformTransformation.go.md @@ -4,12 +4,12 @@ ### TransformTransformation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation vault_transform_transformation}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation vault_transform_transformation}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtransformation" transformtransformation.NewTransformTransformation(scope Construct, id *string, config TransformTransformationConfig) TransformTransformation ``` @@ -441,7 +441,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtransformation" transformtransformation.TransformTransformation_IsConstruct(x interface{}) *bool ``` @@ -473,7 +473,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtransformation" transformtransformation.TransformTransformation_IsTerraformElement(x interface{}) *bool ``` @@ -487,7 +487,7 @@ transformtransformation.TransformTransformation_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtransformation" transformtransformation.TransformTransformation_IsTerraformResource(x interface{}) *bool ``` @@ -501,7 +501,7 @@ transformtransformation.TransformTransformation_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtransformation" transformtransformation.TransformTransformation_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -530,7 +530,7 @@ The construct id used in the generated config for the TransformTransformation to The id of the existing TransformTransformation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use --- @@ -972,7 +972,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformation" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transformtransformation" &transformtransformation.TransformTransformationConfig { Connection: interface{}, @@ -1011,7 +1011,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transformtransformati | Path | *string | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | AllowedRoles | *[]*string | The set of roles allowed to perform this transformation. | | DeletionAllowed | interface{} | If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. | | MaskingCharacter | *string | The character used to replace data when in masking mode. | | Namespace | *string | Target namespace. (requires Enterprise). | | Template | *string | The name of the template to use. | @@ -1101,7 +1101,7 @@ Name *string The name of the transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#name TransformTransformation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#name TransformTransformation#name} --- @@ -1115,7 +1115,7 @@ Path *string The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#path TransformTransformation#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#path TransformTransformation#path} --- @@ -1129,7 +1129,7 @@ AllowedRoles *[]*string The set of roles allowed to perform this transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} --- @@ -1143,7 +1143,7 @@ DeletionAllowed interface{} If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} --- @@ -1155,7 +1155,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1172,7 +1172,7 @@ MaskingCharacter *string The character used to replace data when in masking mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} --- @@ -1186,7 +1186,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} --- @@ -1200,7 +1200,7 @@ Template *string The name of the template to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#template TransformTransformation#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#template TransformTransformation#template} --- @@ -1214,7 +1214,7 @@ Templates *[]*string Templates configured for transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#templates TransformTransformation#templates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#templates TransformTransformation#templates} --- @@ -1228,7 +1228,7 @@ TweakSource *string The source of where the tweak value comes from. Only valid when in FPE mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} --- @@ -1242,7 +1242,7 @@ Type *string The type of transformation to perform. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#type TransformTransformation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#type TransformTransformation#type} --- diff --git a/docs/transformTransformation.java.md b/docs/transformTransformation.java.md index 51113432..ba2f6981 100644 --- a/docs/transformTransformation.java.md +++ b/docs/transformTransformation.java.md @@ -4,7 +4,7 @@ ### TransformTransformation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation vault_transform_transformation}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation vault_transform_transformation}. #### Initializers @@ -53,7 +53,7 @@ TransformTransformation.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | allowedRoles | java.util.List | The set of roles allowed to perform this transformation. | | deletionAllowed | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. | | maskingCharacter | java.lang.String | The character used to replace data when in masking mode. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The name of the template to use. | @@ -129,7 +129,7 @@ Must be unique amongst siblings in the same scope The name of the transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#name TransformTransformation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#name TransformTransformation#name} --- @@ -139,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#path TransformTransformation#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#path TransformTransformation#path} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The set of roles allowed to perform this transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -180,7 +180,7 @@ If you experience problems setting this value it might not be settable. Please t The character used to replace data when in masking mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the template to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#template TransformTransformation#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#template TransformTransformation#template} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Templates configured for transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#templates TransformTransformation#templates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#templates TransformTransformation#templates} --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The source of where the tweak value comes from. Only valid when in FPE mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} --- @@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of transformation to perform. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#type TransformTransformation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#type TransformTransformation#type} --- @@ -720,7 +720,7 @@ The construct id used in the generated config for the TransformTransformation to The id of the existing TransformTransformation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use --- @@ -1206,7 +1206,7 @@ TransformTransformationConfig.builder() | path | java.lang.String | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | allowedRoles | java.util.List | The set of roles allowed to perform this transformation. | | deletionAllowed | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. | | maskingCharacter | java.lang.String | The character used to replace data when in masking mode. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The name of the template to use. | @@ -1296,7 +1296,7 @@ public java.lang.String getName(); The name of the transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#name TransformTransformation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#name TransformTransformation#name} --- @@ -1310,7 +1310,7 @@ public java.lang.String getPath(); The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#path TransformTransformation#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#path TransformTransformation#path} --- @@ -1324,7 +1324,7 @@ public java.util.List getAllowedRoles(); The set of roles allowed to perform this transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} --- @@ -1338,7 +1338,7 @@ public java.lang.Object getDeletionAllowed(); If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} --- @@ -1350,7 +1350,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1367,7 +1367,7 @@ public java.lang.String getMaskingCharacter(); The character used to replace data when in masking mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} --- @@ -1381,7 +1381,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} --- @@ -1395,7 +1395,7 @@ public java.lang.String getTemplate(); The name of the template to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#template TransformTransformation#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#template TransformTransformation#template} --- @@ -1409,7 +1409,7 @@ public java.util.List getTemplates(); Templates configured for transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#templates TransformTransformation#templates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#templates TransformTransformation#templates} --- @@ -1423,7 +1423,7 @@ public java.lang.String getTweakSource(); The source of where the tweak value comes from. Only valid when in FPE mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} --- @@ -1437,7 +1437,7 @@ public java.lang.String getType(); The type of transformation to perform. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#type TransformTransformation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#type TransformTransformation#type} --- diff --git a/docs/transformTransformation.python.md b/docs/transformTransformation.python.md index 0edacb6f..986e7144 100644 --- a/docs/transformTransformation.python.md +++ b/docs/transformTransformation.python.md @@ -4,7 +4,7 @@ ### TransformTransformation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation vault_transform_transformation}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation vault_transform_transformation}. #### Initializers @@ -50,7 +50,7 @@ transformTransformation.TransformTransformation( | path | str | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | allowed_roles | typing.List[str] | The set of roles allowed to perform this transformation. | | deletion_allowed | typing.Union[bool, cdktf.IResolvable] | If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. | | masking_character | str | The character used to replace data when in masking mode. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The name of the template to use. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope The name of the transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#name TransformTransformation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#name TransformTransformation#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#path TransformTransformation#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#path TransformTransformation#path} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The set of roles allowed to perform this transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t The character used to replace data when in masking mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the template to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#template TransformTransformation#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#template TransformTransformation#template} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Templates configured for transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#templates TransformTransformation#templates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#templates TransformTransformation#templates} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The source of where the tweak value comes from. Only valid when in FPE mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of transformation to perform. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#type TransformTransformation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#type TransformTransformation#type} --- @@ -763,7 +763,7 @@ The construct id used in the generated config for the TransformTransformation to The id of the existing TransformTransformation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use --- @@ -1244,7 +1244,7 @@ transformTransformation.TransformTransformationConfig( | path | str | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | allowed_roles | typing.List[str] | The set of roles allowed to perform this transformation. | | deletion_allowed | typing.Union[bool, cdktf.IResolvable] | If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. | | masking_character | str | The character used to replace data when in masking mode. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The name of the template to use. | @@ -1334,7 +1334,7 @@ name: str The name of the transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#name TransformTransformation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#name TransformTransformation#name} --- @@ -1348,7 +1348,7 @@ path: str The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#path TransformTransformation#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#path TransformTransformation#path} --- @@ -1362,7 +1362,7 @@ allowed_roles: typing.List[str] The set of roles allowed to perform this transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} --- @@ -1376,7 +1376,7 @@ deletion_allowed: typing.Union[bool, IResolvable] If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} --- @@ -1388,7 +1388,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1405,7 +1405,7 @@ masking_character: str The character used to replace data when in masking mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} --- @@ -1419,7 +1419,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} --- @@ -1433,7 +1433,7 @@ template: str The name of the template to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#template TransformTransformation#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#template TransformTransformation#template} --- @@ -1447,7 +1447,7 @@ templates: typing.List[str] Templates configured for transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#templates TransformTransformation#templates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#templates TransformTransformation#templates} --- @@ -1461,7 +1461,7 @@ tweak_source: str The source of where the tweak value comes from. Only valid when in FPE mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} --- @@ -1475,7 +1475,7 @@ type: str The type of transformation to perform. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#type TransformTransformation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#type TransformTransformation#type} --- diff --git a/docs/transformTransformation.typescript.md b/docs/transformTransformation.typescript.md index 44164ad7..53314e76 100644 --- a/docs/transformTransformation.typescript.md +++ b/docs/transformTransformation.typescript.md @@ -4,7 +4,7 @@ ### TransformTransformation -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation vault_transform_transformation}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation vault_transform_transformation}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the TransformTransformation to The id of the existing TransformTransformation that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use --- @@ -992,7 +992,7 @@ const transformTransformationConfig: transformTransformation.TransformTransforma | path | string | The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". | | allowedRoles | string[] | The set of roles allowed to perform this transformation. | | deletionAllowed | boolean \| cdktf.IResolvable | If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. | | maskingCharacter | string | The character used to replace data when in masking mode. | | namespace | string | Target namespace. (requires Enterprise). | | template | string | The name of the template to use. | @@ -1082,7 +1082,7 @@ public readonly name: string; The name of the transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#name TransformTransformation#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#name TransformTransformation#name} --- @@ -1096,7 +1096,7 @@ public readonly path: string; The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#path TransformTransformation#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#path TransformTransformation#path} --- @@ -1110,7 +1110,7 @@ public readonly allowedRoles: string[]; The set of roles allowed to perform this transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} --- @@ -1124,7 +1124,7 @@ public readonly deletionAllowed: boolean | IResolvable; If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} --- @@ -1136,7 +1136,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1153,7 +1153,7 @@ public readonly maskingCharacter: string; The character used to replace data when in masking mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} --- @@ -1167,7 +1167,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} --- @@ -1181,7 +1181,7 @@ public readonly template: string; The name of the template to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#template TransformTransformation#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#template TransformTransformation#template} --- @@ -1195,7 +1195,7 @@ public readonly templates: string[]; Templates configured for transformation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#templates TransformTransformation#templates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#templates TransformTransformation#templates} --- @@ -1209,7 +1209,7 @@ public readonly tweakSource: string; The source of where the tweak value comes from. Only valid when in FPE mode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} --- @@ -1223,7 +1223,7 @@ public readonly type: string; The type of transformation to perform. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#type TransformTransformation#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#type TransformTransformation#type} --- diff --git a/docs/transitSecretBackendKey.csharp.md b/docs/transitSecretBackendKey.csharp.md index 6e9a536d..ce536586 100644 --- a/docs/transitSecretBackendKey.csharp.md +++ b/docs/transitSecretBackendKey.csharp.md @@ -4,7 +4,7 @@ ### TransitSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. #### Initializers @@ -74,7 +74,6 @@ Must be unique amongst siblings in the same scope | MoveTo | Moves this resource to the target resource given by moveTarget. | | MoveToId | Moves this resource to the resource corresponding to "id". | | ResetAllowPlaintextBackup | *No description.* | -| ResetAutoRotateInterval | *No description.* | | ResetAutoRotatePeriod | *No description.* | | ResetConvergentEncryption | *No description.* | | ResetDeletionAllowed | *No description.* | @@ -383,12 +382,6 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". private void ResetAllowPlaintextBackup() ``` -##### `ResetAutoRotateInterval` - -```csharp -private void ResetAutoRotateInterval() -``` - ##### `ResetAutoRotatePeriod` ```csharp @@ -558,7 +551,7 @@ The construct id used in the generated config for the TransitSecretBackendKey to The id of the existing TransitSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -596,7 +589,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | SupportsEncryption | HashiCorp.Cdktf.IResolvable | *No description.* | | SupportsSigning | HashiCorp.Cdktf.IResolvable | *No description.* | | AllowPlaintextBackupInput | object | *No description.* | -| AutoRotateIntervalInput | double | *No description.* | | AutoRotatePeriodInput | double | *No description.* | | BackendInput | string | *No description.* | | ConvergentEncryptionInput | object | *No description.* | @@ -611,7 +603,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | NamespaceInput | string | *No description.* | | TypeInput | string | *No description.* | | AllowPlaintextBackup | object | *No description.* | -| AutoRotateInterval | double | *No description.* | | AutoRotatePeriod | double | *No description.* | | Backend | string | *No description.* | | ConvergentEncryption | object | *No description.* | @@ -850,16 +841,6 @@ public object AllowPlaintextBackupInput { get; } --- -##### `AutoRotateIntervalInput`Optional - -```csharp -public double AutoRotateIntervalInput { get; } -``` - -- *Type:* double - ---- - ##### `AutoRotatePeriodInput`Optional ```csharp @@ -1000,16 +981,6 @@ public object AllowPlaintextBackup { get; } --- -##### `AutoRotateInterval`Required - -```csharp -public double AutoRotateInterval { get; } -``` - -- *Type:* double - ---- - ##### `AutoRotatePeriod`Required ```csharp @@ -1178,7 +1149,6 @@ new TransitSecretBackendKeyConfig { string Backend, string Name, object AllowPlaintextBackup = null, - double AutoRotateInterval = null, double AutoRotatePeriod = null, object ConvergentEncryption = null, object DeletionAllowed = null, @@ -1207,13 +1177,12 @@ new TransitSecretBackendKeyConfig { | Backend | string | The Transit secret backend the resource belongs to. | | Name | string | Name of the encryption key to create. | | AllowPlaintextBackup | object | If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. | -| AutoRotateInterval | double | Amount of time the key should live before being automatically rotated. | | AutoRotatePeriod | double | Amount of seconds the key should live before being automatically rotated. | | ConvergentEncryption | object | Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. | | DeletionAllowed | object | Specifies if the key is allowed to be deleted. | | Derived | object | Specifies if key derivation is to be used. | | Exportable | object | Enables keys to be exportable. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | | KeySize | double | The key size in bytes for algorithms that allow variable key sizes. | | MinDecryptionVersion | double | Minimum key version to use for decryption. | | MinEncryptionVersion | double | Minimum key version to use for encryption. | @@ -1302,7 +1271,7 @@ public string Backend { get; set; } The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} --- @@ -1316,7 +1285,7 @@ public string Name { get; set; } Name of the encryption key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} --- @@ -1330,23 +1299,7 @@ public object AllowPlaintextBackup { get; set; } If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} - ---- - -##### `AutoRotateInterval`Optional - -```csharp -public double AutoRotateInterval { get; set; } -``` - -- *Type:* double - -Amount of time the key should live before being automatically rotated. - -A value of 0 disables automatic rotation for the key. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_interval TransitSecretBackendKey#auto_rotate_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} --- @@ -1362,7 +1315,7 @@ Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} --- @@ -1378,7 +1331,7 @@ Whether or not to support convergent encryption, where the same plaintext create This requires derived to be set to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} --- @@ -1392,7 +1345,7 @@ public object DeletionAllowed { get; set; } Specifies if the key is allowed to be deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} --- @@ -1408,7 +1361,7 @@ Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} --- @@ -1424,7 +1377,7 @@ Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} --- @@ -1436,7 +1389,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1455,7 +1408,7 @@ The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} --- @@ -1469,7 +1422,7 @@ public double MinDecryptionVersion { get; set; } Minimum key version to use for decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} --- @@ -1483,7 +1436,7 @@ public double MinEncryptionVersion { get; set; } Minimum key version to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} --- @@ -1497,7 +1450,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} --- @@ -1513,7 +1466,7 @@ Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} --- diff --git a/docs/transitSecretBackendKey.go.md b/docs/transitSecretBackendKey.go.md index 75ec95c0..83cd1004 100644 --- a/docs/transitSecretBackendKey.go.md +++ b/docs/transitSecretBackendKey.go.md @@ -4,12 +4,12 @@ ### TransitSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretbackendkey" transitsecretbackendkey.NewTransitSecretBackendKey(scope Construct, id *string, config TransitSecretBackendKeyConfig) TransitSecretBackendKey ``` @@ -74,7 +74,6 @@ Must be unique amongst siblings in the same scope | MoveTo | Moves this resource to the target resource given by moveTarget. | | MoveToId | Moves this resource to the resource corresponding to "id". | | ResetAllowPlaintextBackup | *No description.* | -| ResetAutoRotateInterval | *No description.* | | ResetAutoRotatePeriod | *No description.* | | ResetConvergentEncryption | *No description.* | | ResetDeletionAllowed | *No description.* | @@ -383,12 +382,6 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". func ResetAllowPlaintextBackup() ``` -##### `ResetAutoRotateInterval` - -```go -func ResetAutoRotateInterval() -``` - ##### `ResetAutoRotatePeriod` ```go @@ -469,7 +462,7 @@ func ResetType() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretbackendkey" transitsecretbackendkey.TransitSecretBackendKey_IsConstruct(x interface{}) *bool ``` @@ -501,7 +494,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretbackendkey" transitsecretbackendkey.TransitSecretBackendKey_IsTerraformElement(x interface{}) *bool ``` @@ -515,7 +508,7 @@ transitsecretbackendkey.TransitSecretBackendKey_IsTerraformElement(x interface{} ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretbackendkey" transitsecretbackendkey.TransitSecretBackendKey_IsTerraformResource(x interface{}) *bool ``` @@ -529,7 +522,7 @@ transitsecretbackendkey.TransitSecretBackendKey_IsTerraformResource(x interface{ ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretbackendkey" transitsecretbackendkey.TransitSecretBackendKey_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -558,7 +551,7 @@ The construct id used in the generated config for the TransitSecretBackendKey to The id of the existing TransitSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -596,7 +589,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | SupportsEncryption | github.com/hashicorp/terraform-cdk-go/cdktf.IResolvable | *No description.* | | SupportsSigning | github.com/hashicorp/terraform-cdk-go/cdktf.IResolvable | *No description.* | | AllowPlaintextBackupInput | interface{} | *No description.* | -| AutoRotateIntervalInput | *f64 | *No description.* | | AutoRotatePeriodInput | *f64 | *No description.* | | BackendInput | *string | *No description.* | | ConvergentEncryptionInput | interface{} | *No description.* | @@ -611,7 +603,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | NamespaceInput | *string | *No description.* | | TypeInput | *string | *No description.* | | AllowPlaintextBackup | interface{} | *No description.* | -| AutoRotateInterval | *f64 | *No description.* | | AutoRotatePeriod | *f64 | *No description.* | | Backend | *string | *No description.* | | ConvergentEncryption | interface{} | *No description.* | @@ -850,16 +841,6 @@ func AllowPlaintextBackupInput() interface{} --- -##### `AutoRotateIntervalInput`Optional - -```go -func AutoRotateIntervalInput() *f64 -``` - -- *Type:* *f64 - ---- - ##### `AutoRotatePeriodInput`Optional ```go @@ -1000,16 +981,6 @@ func AllowPlaintextBackup() interface{} --- -##### `AutoRotateInterval`Required - -```go -func AutoRotateInterval() *f64 -``` - -- *Type:* *f64 - ---- - ##### `AutoRotatePeriod`Required ```go @@ -1165,7 +1136,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendkey" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretbackendkey" &transitsecretbackendkey.TransitSecretBackendKeyConfig { Connection: interface{}, @@ -1178,7 +1149,6 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendk Backend: *string, Name: *string, AllowPlaintextBackup: interface{}, - AutoRotateInterval: *f64, AutoRotatePeriod: *f64, ConvergentEncryption: interface{}, DeletionAllowed: interface{}, @@ -1207,13 +1177,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretbackendk | Backend | *string | The Transit secret backend the resource belongs to. | | Name | *string | Name of the encryption key to create. | | AllowPlaintextBackup | interface{} | If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. | -| AutoRotateInterval | *f64 | Amount of time the key should live before being automatically rotated. | | AutoRotatePeriod | *f64 | Amount of seconds the key should live before being automatically rotated. | | ConvergentEncryption | interface{} | Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. | | DeletionAllowed | interface{} | Specifies if the key is allowed to be deleted. | | Derived | interface{} | Specifies if key derivation is to be used. | | Exportable | interface{} | Enables keys to be exportable. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | | KeySize | *f64 | The key size in bytes for algorithms that allow variable key sizes. | | MinDecryptionVersion | *f64 | Minimum key version to use for decryption. | | MinEncryptionVersion | *f64 | Minimum key version to use for encryption. | @@ -1302,7 +1271,7 @@ Backend *string The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} --- @@ -1316,7 +1285,7 @@ Name *string Name of the encryption key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} --- @@ -1330,23 +1299,7 @@ AllowPlaintextBackup interface{} If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} - ---- - -##### `AutoRotateInterval`Optional - -```go -AutoRotateInterval *f64 -``` - -- *Type:* *f64 - -Amount of time the key should live before being automatically rotated. - -A value of 0 disables automatic rotation for the key. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_interval TransitSecretBackendKey#auto_rotate_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} --- @@ -1362,7 +1315,7 @@ Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} --- @@ -1378,7 +1331,7 @@ Whether or not to support convergent encryption, where the same plaintext create This requires derived to be set to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} --- @@ -1392,7 +1345,7 @@ DeletionAllowed interface{} Specifies if the key is allowed to be deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} --- @@ -1408,7 +1361,7 @@ Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} --- @@ -1424,7 +1377,7 @@ Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} --- @@ -1436,7 +1389,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1455,7 +1408,7 @@ The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} --- @@ -1469,7 +1422,7 @@ MinDecryptionVersion *f64 Minimum key version to use for decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} --- @@ -1483,7 +1436,7 @@ MinEncryptionVersion *f64 Minimum key version to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} --- @@ -1497,7 +1450,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} --- @@ -1513,7 +1466,7 @@ Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} --- diff --git a/docs/transitSecretBackendKey.java.md b/docs/transitSecretBackendKey.java.md index 177e75f2..8d613417 100644 --- a/docs/transitSecretBackendKey.java.md +++ b/docs/transitSecretBackendKey.java.md @@ -4,7 +4,7 @@ ### TransitSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. #### Initializers @@ -27,7 +27,6 @@ TransitSecretBackendKey.Builder.create(Construct scope, java.lang.String id) .name(java.lang.String) // .allowPlaintextBackup(java.lang.Boolean) // .allowPlaintextBackup(IResolvable) -// .autoRotateInterval(java.lang.Number) // .autoRotatePeriod(java.lang.Number) // .convergentEncryption(java.lang.Boolean) // .convergentEncryption(IResolvable) @@ -60,13 +59,12 @@ TransitSecretBackendKey.Builder.create(Construct scope, java.lang.String id) | backend | java.lang.String | The Transit secret backend the resource belongs to. | | name | java.lang.String | Name of the encryption key to create. | | allowPlaintextBackup | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. | -| autoRotateInterval | java.lang.Number | Amount of time the key should live before being automatically rotated. | | autoRotatePeriod | java.lang.Number | Amount of seconds the key should live before being automatically rotated. | | convergentEncryption | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. | | deletionAllowed | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the key is allowed to be deleted. | | derived | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if key derivation is to be used. | | exportable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables keys to be exportable. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | | keySize | java.lang.Number | The key size in bytes for algorithms that allow variable key sizes. | | minDecryptionVersion | java.lang.Number | Minimum key version to use for decryption. | | minEncryptionVersion | java.lang.Number | Minimum key version to use for encryption. | @@ -141,7 +139,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} --- @@ -151,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the encryption key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} --- @@ -161,19 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} - ---- - -##### `autoRotateInterval`Optional - -- *Type:* java.lang.Number - -Amount of time the key should live before being automatically rotated. - -A value of 0 disables automatic rotation for the key. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_interval TransitSecretBackendKey#auto_rotate_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} --- @@ -185,7 +171,7 @@ Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} --- @@ -197,7 +183,7 @@ Whether or not to support convergent encryption, where the same plaintext create This requires derived to be set to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} --- @@ -207,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the key is allowed to be deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} --- @@ -219,7 +205,7 @@ Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} --- @@ -231,7 +217,7 @@ Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} --- @@ -239,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -254,7 +240,7 @@ The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} --- @@ -264,7 +250,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum key version to use for decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} --- @@ -274,7 +260,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum key version to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} --- @@ -284,7 +270,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} --- @@ -296,7 +282,7 @@ Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} --- @@ -328,7 +314,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | moveTo | Moves this resource to the target resource given by moveTarget. | | moveToId | Moves this resource to the resource corresponding to "id". | | resetAllowPlaintextBackup | *No description.* | -| resetAutoRotateInterval | *No description.* | | resetAutoRotatePeriod | *No description.* | | resetConvergentEncryption | *No description.* | | resetDeletionAllowed | *No description.* | @@ -639,12 +624,6 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". public void resetAllowPlaintextBackup() ``` -##### `resetAutoRotateInterval` - -```java -public void resetAutoRotateInterval() -``` - ##### `resetAutoRotatePeriod` ```java @@ -814,7 +793,7 @@ The construct id used in the generated config for the TransitSecretBackendKey to The id of the existing TransitSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -852,7 +831,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | supportsEncryption | com.hashicorp.cdktf.IResolvable | *No description.* | | supportsSigning | com.hashicorp.cdktf.IResolvable | *No description.* | | allowPlaintextBackupInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | -| autoRotateIntervalInput | java.lang.Number | *No description.* | | autoRotatePeriodInput | java.lang.Number | *No description.* | | backendInput | java.lang.String | *No description.* | | convergentEncryptionInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -867,7 +845,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | namespaceInput | java.lang.String | *No description.* | | typeInput | java.lang.String | *No description.* | | allowPlaintextBackup | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | -| autoRotateInterval | java.lang.Number | *No description.* | | autoRotatePeriod | java.lang.Number | *No description.* | | backend | java.lang.String | *No description.* | | convergentEncryption | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -1106,16 +1083,6 @@ public java.lang.Object getAllowPlaintextBackupInput(); --- -##### `autoRotateIntervalInput`Optional - -```java -public java.lang.Number getAutoRotateIntervalInput(); -``` - -- *Type:* java.lang.Number - ---- - ##### `autoRotatePeriodInput`Optional ```java @@ -1256,16 +1223,6 @@ public java.lang.Object getAllowPlaintextBackup(); --- -##### `autoRotateInterval`Required - -```java -public java.lang.Number getAutoRotateInterval(); -``` - -- *Type:* java.lang.Number - ---- - ##### `autoRotatePeriod`Required ```java @@ -1439,7 +1396,6 @@ TransitSecretBackendKeyConfig.builder() .name(java.lang.String) // .allowPlaintextBackup(java.lang.Boolean) // .allowPlaintextBackup(IResolvable) -// .autoRotateInterval(java.lang.Number) // .autoRotatePeriod(java.lang.Number) // .convergentEncryption(java.lang.Boolean) // .convergentEncryption(IResolvable) @@ -1472,13 +1428,12 @@ TransitSecretBackendKeyConfig.builder() | backend | java.lang.String | The Transit secret backend the resource belongs to. | | name | java.lang.String | Name of the encryption key to create. | | allowPlaintextBackup | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. | -| autoRotateInterval | java.lang.Number | Amount of time the key should live before being automatically rotated. | | autoRotatePeriod | java.lang.Number | Amount of seconds the key should live before being automatically rotated. | | convergentEncryption | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. | | deletionAllowed | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the key is allowed to be deleted. | | derived | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if key derivation is to be used. | | exportable | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enables keys to be exportable. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | | keySize | java.lang.Number | The key size in bytes for algorithms that allow variable key sizes. | | minDecryptionVersion | java.lang.Number | Minimum key version to use for decryption. | | minEncryptionVersion | java.lang.Number | Minimum key version to use for encryption. | @@ -1567,7 +1522,7 @@ public java.lang.String getBackend(); The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} --- @@ -1581,7 +1536,7 @@ public java.lang.String getName(); Name of the encryption key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} --- @@ -1595,23 +1550,7 @@ public java.lang.Object getAllowPlaintextBackup(); If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} - ---- - -##### `autoRotateInterval`Optional - -```java -public java.lang.Number getAutoRotateInterval(); -``` - -- *Type:* java.lang.Number - -Amount of time the key should live before being automatically rotated. - -A value of 0 disables automatic rotation for the key. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_interval TransitSecretBackendKey#auto_rotate_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} --- @@ -1627,7 +1566,7 @@ Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} --- @@ -1643,7 +1582,7 @@ Whether or not to support convergent encryption, where the same plaintext create This requires derived to be set to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} --- @@ -1657,7 +1596,7 @@ public java.lang.Object getDeletionAllowed(); Specifies if the key is allowed to be deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} --- @@ -1673,7 +1612,7 @@ Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} --- @@ -1689,7 +1628,7 @@ Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} --- @@ -1701,7 +1640,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1720,7 +1659,7 @@ The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} --- @@ -1734,7 +1673,7 @@ public java.lang.Number getMinDecryptionVersion(); Minimum key version to use for decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} --- @@ -1748,7 +1687,7 @@ public java.lang.Number getMinEncryptionVersion(); Minimum key version to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} --- @@ -1762,7 +1701,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} --- @@ -1778,7 +1717,7 @@ Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} --- diff --git a/docs/transitSecretBackendKey.python.md b/docs/transitSecretBackendKey.python.md index de16e5f8..6e2d50df 100644 --- a/docs/transitSecretBackendKey.python.md +++ b/docs/transitSecretBackendKey.python.md @@ -4,7 +4,7 @@ ### TransitSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. #### Initializers @@ -24,7 +24,6 @@ transitSecretBackendKey.TransitSecretBackendKey( backend: str, name: str, allow_plaintext_backup: typing.Union[bool, IResolvable] = None, - auto_rotate_interval: typing.Union[int, float] = None, auto_rotate_period: typing.Union[int, float] = None, convergent_encryption: typing.Union[bool, IResolvable] = None, deletion_allowed: typing.Union[bool, IResolvable] = None, @@ -53,13 +52,12 @@ transitSecretBackendKey.TransitSecretBackendKey( | backend | str | The Transit secret backend the resource belongs to. | | name | str | Name of the encryption key to create. | | allow_plaintext_backup | typing.Union[bool, cdktf.IResolvable] | If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. | -| auto_rotate_interval | typing.Union[int, float] | Amount of time the key should live before being automatically rotated. | | auto_rotate_period | typing.Union[int, float] | Amount of seconds the key should live before being automatically rotated. | | convergent_encryption | typing.Union[bool, cdktf.IResolvable] | Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. | | deletion_allowed | typing.Union[bool, cdktf.IResolvable] | Specifies if the key is allowed to be deleted. | | derived | typing.Union[bool, cdktf.IResolvable] | Specifies if key derivation is to be used. | | exportable | typing.Union[bool, cdktf.IResolvable] | Enables keys to be exportable. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | | key_size | typing.Union[int, float] | The key size in bytes for algorithms that allow variable key sizes. | | min_decryption_version | typing.Union[int, float] | Minimum key version to use for decryption. | | min_encryption_version | typing.Union[int, float] | Minimum key version to use for encryption. | @@ -134,7 +132,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} --- @@ -144,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the encryption key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} --- @@ -154,19 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} - ---- - -##### `auto_rotate_interval`Optional - -- *Type:* typing.Union[int, float] - -Amount of time the key should live before being automatically rotated. - -A value of 0 disables automatic rotation for the key. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_interval TransitSecretBackendKey#auto_rotate_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} --- @@ -178,7 +164,7 @@ Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} --- @@ -190,7 +176,7 @@ Whether or not to support convergent encryption, where the same plaintext create This requires derived to be set to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} --- @@ -200,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the key is allowed to be deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} --- @@ -212,7 +198,7 @@ Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} --- @@ -224,7 +210,7 @@ Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} --- @@ -232,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -247,7 +233,7 @@ The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} --- @@ -257,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum key version to use for decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} --- @@ -267,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum key version to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} --- @@ -277,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} --- @@ -289,7 +275,7 @@ Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} --- @@ -321,7 +307,6 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | move_to | Moves this resource to the target resource given by moveTarget. | | move_to_id | Moves this resource to the resource corresponding to "id". | | reset_allow_plaintext_backup | *No description.* | -| reset_auto_rotate_interval | *No description.* | | reset_auto_rotate_period | *No description.* | | reset_convergent_encryption | *No description.* | | reset_deletion_allowed | *No description.* | @@ -667,12 +652,6 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". def reset_allow_plaintext_backup() -> None ``` -##### `reset_auto_rotate_interval` - -```python -def reset_auto_rotate_interval() -> None -``` - ##### `reset_auto_rotate_period` ```python @@ -853,7 +832,7 @@ The construct id used in the generated config for the TransitSecretBackendKey to The id of the existing TransitSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -891,7 +870,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | supports_encryption | cdktf.IResolvable | *No description.* | | supports_signing | cdktf.IResolvable | *No description.* | | allow_plaintext_backup_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | -| auto_rotate_interval_input | typing.Union[int, float] | *No description.* | | auto_rotate_period_input | typing.Union[int, float] | *No description.* | | backend_input | str | *No description.* | | convergent_encryption_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -906,7 +884,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | namespace_input | str | *No description.* | | type_input | str | *No description.* | | allow_plaintext_backup | typing.Union[bool, cdktf.IResolvable] | *No description.* | -| auto_rotate_interval | typing.Union[int, float] | *No description.* | | auto_rotate_period | typing.Union[int, float] | *No description.* | | backend | str | *No description.* | | convergent_encryption | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -1145,16 +1122,6 @@ allow_plaintext_backup_input: typing.Union[bool, IResolvable] --- -##### `auto_rotate_interval_input`Optional - -```python -auto_rotate_interval_input: typing.Union[int, float] -``` - -- *Type:* typing.Union[int, float] - ---- - ##### `auto_rotate_period_input`Optional ```python @@ -1295,16 +1262,6 @@ allow_plaintext_backup: typing.Union[bool, IResolvable] --- -##### `auto_rotate_interval`Required - -```python -auto_rotate_interval: typing.Union[int, float] -``` - -- *Type:* typing.Union[int, float] - ---- - ##### `auto_rotate_period`Required ```python @@ -1473,7 +1430,6 @@ transitSecretBackendKey.TransitSecretBackendKeyConfig( backend: str, name: str, allow_plaintext_backup: typing.Union[bool, IResolvable] = None, - auto_rotate_interval: typing.Union[int, float] = None, auto_rotate_period: typing.Union[int, float] = None, convergent_encryption: typing.Union[bool, IResolvable] = None, deletion_allowed: typing.Union[bool, IResolvable] = None, @@ -1502,13 +1458,12 @@ transitSecretBackendKey.TransitSecretBackendKeyConfig( | backend | str | The Transit secret backend the resource belongs to. | | name | str | Name of the encryption key to create. | | allow_plaintext_backup | typing.Union[bool, cdktf.IResolvable] | If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. | -| auto_rotate_interval | typing.Union[int, float] | Amount of time the key should live before being automatically rotated. | | auto_rotate_period | typing.Union[int, float] | Amount of seconds the key should live before being automatically rotated. | | convergent_encryption | typing.Union[bool, cdktf.IResolvable] | Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. | | deletion_allowed | typing.Union[bool, cdktf.IResolvable] | Specifies if the key is allowed to be deleted. | | derived | typing.Union[bool, cdktf.IResolvable] | Specifies if key derivation is to be used. | | exportable | typing.Union[bool, cdktf.IResolvable] | Enables keys to be exportable. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | | key_size | typing.Union[int, float] | The key size in bytes for algorithms that allow variable key sizes. | | min_decryption_version | typing.Union[int, float] | Minimum key version to use for decryption. | | min_encryption_version | typing.Union[int, float] | Minimum key version to use for encryption. | @@ -1597,7 +1552,7 @@ backend: str The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} --- @@ -1611,7 +1566,7 @@ name: str Name of the encryption key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} --- @@ -1625,23 +1580,7 @@ allow_plaintext_backup: typing.Union[bool, IResolvable] If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} - ---- - -##### `auto_rotate_interval`Optional - -```python -auto_rotate_interval: typing.Union[int, float] -``` - -- *Type:* typing.Union[int, float] - -Amount of time the key should live before being automatically rotated. - -A value of 0 disables automatic rotation for the key. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_interval TransitSecretBackendKey#auto_rotate_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} --- @@ -1657,7 +1596,7 @@ Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} --- @@ -1673,7 +1612,7 @@ Whether or not to support convergent encryption, where the same plaintext create This requires derived to be set to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} --- @@ -1687,7 +1626,7 @@ deletion_allowed: typing.Union[bool, IResolvable] Specifies if the key is allowed to be deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} --- @@ -1703,7 +1642,7 @@ Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} --- @@ -1719,7 +1658,7 @@ Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} --- @@ -1731,7 +1670,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1750,7 +1689,7 @@ The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} --- @@ -1764,7 +1703,7 @@ min_decryption_version: typing.Union[int, float] Minimum key version to use for decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} --- @@ -1778,7 +1717,7 @@ min_encryption_version: typing.Union[int, float] Minimum key version to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} --- @@ -1792,7 +1731,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} --- @@ -1808,7 +1747,7 @@ Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} --- diff --git a/docs/transitSecretBackendKey.typescript.md b/docs/transitSecretBackendKey.typescript.md index fb9fe669..5680c13c 100644 --- a/docs/transitSecretBackendKey.typescript.md +++ b/docs/transitSecretBackendKey.typescript.md @@ -4,7 +4,7 @@ ### TransitSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key}. #### Initializers @@ -74,7 +74,6 @@ Must be unique amongst siblings in the same scope | moveTo | Moves this resource to the target resource given by moveTarget. | | moveToId | Moves this resource to the resource corresponding to "id". | | resetAllowPlaintextBackup | *No description.* | -| resetAutoRotateInterval | *No description.* | | resetAutoRotatePeriod | *No description.* | | resetConvergentEncryption | *No description.* | | resetDeletionAllowed | *No description.* | @@ -383,12 +382,6 @@ Full id of resource to move to, e.g. "aws_s3_bucket.example". public resetAllowPlaintextBackup(): void ``` -##### `resetAutoRotateInterval` - -```typescript -public resetAutoRotateInterval(): void -``` - ##### `resetAutoRotatePeriod` ```typescript @@ -558,7 +551,7 @@ The construct id used in the generated config for the TransitSecretBackendKey to The id of the existing TransitSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -596,7 +589,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | supportsEncryption | cdktf.IResolvable | *No description.* | | supportsSigning | cdktf.IResolvable | *No description.* | | allowPlaintextBackupInput | boolean \| cdktf.IResolvable | *No description.* | -| autoRotateIntervalInput | number | *No description.* | | autoRotatePeriodInput | number | *No description.* | | backendInput | string | *No description.* | | convergentEncryptionInput | boolean \| cdktf.IResolvable | *No description.* | @@ -611,7 +603,6 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25 | namespaceInput | string | *No description.* | | typeInput | string | *No description.* | | allowPlaintextBackup | boolean \| cdktf.IResolvable | *No description.* | -| autoRotateInterval | number | *No description.* | | autoRotatePeriod | number | *No description.* | | backend | string | *No description.* | | convergentEncryption | boolean \| cdktf.IResolvable | *No description.* | @@ -850,16 +841,6 @@ public readonly allowPlaintextBackupInput: boolean | IResolvable; --- -##### `autoRotateIntervalInput`Optional - -```typescript -public readonly autoRotateIntervalInput: number; -``` - -- *Type:* number - ---- - ##### `autoRotatePeriodInput`Optional ```typescript @@ -1000,16 +981,6 @@ public readonly allowPlaintextBackup: boolean | IResolvable; --- -##### `autoRotateInterval`Required - -```typescript -public readonly autoRotateInterval: number; -``` - -- *Type:* number - ---- - ##### `autoRotatePeriod`Required ```typescript @@ -1184,13 +1155,12 @@ const transitSecretBackendKeyConfig: transitSecretBackendKey.TransitSecretBacken | backend | string | The Transit secret backend the resource belongs to. | | name | string | Name of the encryption key to create. | | allowPlaintextBackup | boolean \| cdktf.IResolvable | If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. | -| autoRotateInterval | number | Amount of time the key should live before being automatically rotated. | | autoRotatePeriod | number | Amount of seconds the key should live before being automatically rotated. | | convergentEncryption | boolean \| cdktf.IResolvable | Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. | | deletionAllowed | boolean \| cdktf.IResolvable | Specifies if the key is allowed to be deleted. | | derived | boolean \| cdktf.IResolvable | Specifies if key derivation is to be used. | | exportable | boolean \| cdktf.IResolvable | Enables keys to be exportable. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. | | keySize | number | The key size in bytes for algorithms that allow variable key sizes. | | minDecryptionVersion | number | Minimum key version to use for decryption. | | minEncryptionVersion | number | Minimum key version to use for encryption. | @@ -1279,7 +1249,7 @@ public readonly backend: string; The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} --- @@ -1293,7 +1263,7 @@ public readonly name: string; Name of the encryption key to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} --- @@ -1307,23 +1277,7 @@ public readonly allowPlaintextBackup: boolean | IResolvable; If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} - ---- - -##### `autoRotateInterval`Optional - -```typescript -public readonly autoRotateInterval: number; -``` - -- *Type:* number - -Amount of time the key should live before being automatically rotated. - -A value of 0 disables automatic rotation for the key. - -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_interval TransitSecretBackendKey#auto_rotate_interval} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} --- @@ -1339,7 +1293,7 @@ Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} --- @@ -1355,7 +1309,7 @@ Whether or not to support convergent encryption, where the same plaintext create This requires derived to be set to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} --- @@ -1369,7 +1323,7 @@ public readonly deletionAllowed: boolean | IResolvable; Specifies if the key is allowed to be deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} --- @@ -1385,7 +1339,7 @@ Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} --- @@ -1401,7 +1355,7 @@ Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} --- @@ -1413,7 +1367,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1432,7 +1386,7 @@ The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} --- @@ -1446,7 +1400,7 @@ public readonly minDecryptionVersion: number; Minimum key version to use for decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} --- @@ -1460,7 +1414,7 @@ public readonly minEncryptionVersion: number; Minimum key version to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} --- @@ -1474,7 +1428,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} --- @@ -1490,7 +1444,7 @@ Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} --- diff --git a/docs/transitSecretCacheConfig.csharp.md b/docs/transitSecretCacheConfig.csharp.md index 150bf869..3e253e8d 100644 --- a/docs/transitSecretCacheConfig.csharp.md +++ b/docs/transitSecretCacheConfig.csharp.md @@ -4,7 +4,7 @@ ### TransitSecretCacheConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the TransitSecretCacheConfig t The id of the existing TransitSecretCacheConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ new TransitSecretCacheConfigConfig { | Provisioners | object[] | *No description.* | | Backend | string | The Transit secret backend the resource belongs to. | | Size | double | Number of cache entries. A size of 0 mean unlimited. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ public string Backend { get; set; } The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} --- @@ -898,7 +898,7 @@ public double Size { get; set; } Number of cache entries. A size of 0 mean unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} --- @@ -910,7 +910,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} --- diff --git a/docs/transitSecretCacheConfig.go.md b/docs/transitSecretCacheConfig.go.md index 4b87b24d..bd54eaa5 100644 --- a/docs/transitSecretCacheConfig.go.md +++ b/docs/transitSecretCacheConfig.go.md @@ -4,12 +4,12 @@ ### TransitSecretCacheConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. #### Initializers ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretcacheconfig" transitsecretcacheconfig.NewTransitSecretCacheConfig(scope Construct, id *string, config TransitSecretCacheConfigConfig) TransitSecretCacheConfig ``` @@ -392,7 +392,7 @@ func ResetNamespace() ##### `IsConstruct` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretcacheconfig" transitsecretcacheconfig.TransitSecretCacheConfig_IsConstruct(x interface{}) *bool ``` @@ -424,7 +424,7 @@ Any object. ##### `IsTerraformElement` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretcacheconfig" transitsecretcacheconfig.TransitSecretCacheConfig_IsTerraformElement(x interface{}) *bool ``` @@ -438,7 +438,7 @@ transitsecretcacheconfig.TransitSecretCacheConfig_IsTerraformElement(x interface ##### `IsTerraformResource` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretcacheconfig" transitsecretcacheconfig.TransitSecretCacheConfig_IsTerraformResource(x interface{}) *bool ``` @@ -452,7 +452,7 @@ transitsecretcacheconfig.TransitSecretCacheConfig_IsTerraformResource(x interfac ##### `GenerateConfigForImport` ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretcacheconfig" transitsecretcacheconfig.TransitSecretCacheConfig_GenerateConfigForImport(scope Construct, importToId *string, importFromId *string, provider TerraformProvider) ImportableResource ``` @@ -481,7 +481,7 @@ The construct id used in the generated config for the TransitSecretCacheConfig t The id of the existing TransitSecretCacheConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ func TfResourceType() *string #### Initializer ```go -import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcacheconfig" +import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/transitsecretcacheconfig" &transitsecretcacheconfig.TransitSecretCacheConfigConfig { Connection: interface{}, @@ -799,7 +799,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v12/transitsecretcachecon | Provisioners | *[]interface{} | *No description.* | | Backend | *string | The Transit secret backend the resource belongs to. | | Size | *f64 | Number of cache entries. A size of 0 mean unlimited. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ Backend *string The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} --- @@ -898,7 +898,7 @@ Size *f64 Number of cache entries. A size of 0 mean unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} --- @@ -910,7 +910,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} --- diff --git a/docs/transitSecretCacheConfig.java.md b/docs/transitSecretCacheConfig.java.md index 456c703a..bbb66956 100644 --- a/docs/transitSecretCacheConfig.java.md +++ b/docs/transitSecretCacheConfig.java.md @@ -4,7 +4,7 @@ ### TransitSecretCacheConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. #### Initializers @@ -43,7 +43,7 @@ TransitSecretCacheConfig.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The Transit secret backend the resource belongs to. | | size | java.lang.Number | Number of cache entries. A size of 0 mean unlimited. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Number of cache entries. A size of 0 mean unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the TransitSecretCacheConfig t The id of the existing TransitSecretCacheConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ TransitSecretCacheConfigConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The Transit secret backend the resource belongs to. | | size | java.lang.Number | Number of cache entries. A size of 0 mean unlimited. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ public java.lang.String getBackend(); The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} --- @@ -1007,7 +1007,7 @@ public java.lang.Number getSize(); Number of cache entries. A size of 0 mean unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} --- @@ -1019,7 +1019,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} --- diff --git a/docs/transitSecretCacheConfig.python.md b/docs/transitSecretCacheConfig.python.md index c10ba80b..8114ddf9 100644 --- a/docs/transitSecretCacheConfig.python.md +++ b/docs/transitSecretCacheConfig.python.md @@ -4,7 +4,7 @@ ### TransitSecretCacheConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. #### Initializers @@ -41,7 +41,7 @@ transitSecretCacheConfig.TransitSecretCacheConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The Transit secret backend the resource belongs to. | | size | typing.Union[int, float] | Number of cache entries. A size of 0 mean unlimited. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Number of cache entries. A size of 0 mean unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the TransitSecretCacheConfig t The id of the existing TransitSecretCacheConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use --- @@ -948,7 +948,7 @@ transitSecretCacheConfig.TransitSecretCacheConfigConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The Transit secret backend the resource belongs to. | | size | typing.Union[int, float] | Number of cache entries. A size of 0 mean unlimited. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1033,7 +1033,7 @@ backend: str The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} --- @@ -1047,7 +1047,7 @@ size: typing.Union[int, float] Number of cache entries. A size of 0 mean unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} --- @@ -1059,7 +1059,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} --- diff --git a/docs/transitSecretCacheConfig.typescript.md b/docs/transitSecretCacheConfig.typescript.md index 8db24a51..a95474b2 100644 --- a/docs/transitSecretCacheConfig.typescript.md +++ b/docs/transitSecretCacheConfig.typescript.md @@ -4,7 +4,7 @@ ### TransitSecretCacheConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the TransitSecretCacheConfig t The id of the existing TransitSecretCacheConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ const transitSecretCacheConfigConfig: transitSecretCacheConfig.TransitSecretCach | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | The Transit secret backend the resource belongs to. | | size | number | Number of cache entries. A size of 0 mean unlimited. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ public readonly backend: string; The Transit secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} --- @@ -886,7 +886,7 @@ public readonly size: number; Number of cache entries. A size of 0 mean unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} --- @@ -898,7 +898,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} --- diff --git a/package.json b/package.json index f6b57b4e..e8aee459 100644 --- a/package.json +++ b/package.json @@ -154,7 +154,7 @@ "isDeprecated": false, "provider": { "name": "registry.terraform.io/hashicorp/vault", - "version": "3.25.0" + "version": "4.0.0" } }, "//": "~~ Generated by projen. To modify, edit .projenrc.js and run \"npx projen\"." diff --git a/scripts/check-for-upgrades.js b/scripts/check-for-upgrades.js index 3313b84e..c12ba883 100644 --- a/scripts/check-for-upgrades.js +++ b/scripts/check-for-upgrades.js @@ -13,7 +13,7 @@ const actions = require("@actions/core"); // const { versionMatchesConstraint } = require('cdktf-cli/lib/dependencies/version-constraints'); // set by the projen file that generates this script -const CONSTRAINT = "~> 3.7"; +const CONSTRAINT = "~> 4.0"; const FQ_PROVIDER_NAME = "hashicorp/vault"; (async function main() { diff --git a/src/ad-secret-backend/README.md b/src/ad-secret-backend/README.md index be2969cc..d4d68860 100644 --- a/src/ad-secret-backend/README.md +++ b/src/ad-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_ad_secret_backend` -Refer to the Terraform Registry for docs: [`vault_ad_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend). +Refer to the Terraform Registry for docs: [`vault_ad_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend). diff --git a/src/ad-secret-backend/index.ts b/src/ad-secret-backend/index.ts index 812ba0d0..f20863c4 100644 --- a/src/ad-secret-backend/index.ts +++ b/src/ad-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,107 +15,101 @@ export interface AdSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} */ readonly anonymousGroupSearch?: boolean | cdktf.IResolvable; /** * The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} */ readonly backend?: string; /** * Distinguished name of object to bind when performing user and group search. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} */ readonly binddn: string; /** * LDAP password for searching for the user DN. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} */ readonly bindpass: string; /** * If true, case sensitivity will be used when comparing usernames and groups for matching policies. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} */ readonly caseSensitiveNames?: boolean | cdktf.IResolvable; /** * CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} */ readonly certificate?: string; /** * Client certificate to provide to the LDAP server, must be x509 PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} */ readonly clientTlsCert?: string; /** * Client certificate key to provide to the LDAP server, must be x509 PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} */ readonly clientTlsKey?: string; /** * Default lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} */ readonly denyNullBind?: boolean | cdktf.IResolvable; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** * Use anonymous bind to discover the bind DN of a user. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} */ readonly discoverdn?: boolean | cdktf.IResolvable; /** - * Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". - * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#formatter AdSecretBackend#formatter} - */ - readonly formatter?: string; - /** * LDAP attribute to follow on objects returned by in order to enumerate user group membership. Examples: "cn" or "memberOf", etc. Default: cn * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} */ readonly groupattr?: string; /** * LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} */ readonly groupdn?: string; /** * Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} */ readonly groupfilter?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#id AdSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#id AdSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -124,121 +118,115 @@ export interface AdSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} */ readonly lastRotationTolerance?: number; /** - * The desired length of passwords that Vault generates. - * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#length AdSecretBackend#length} - */ - readonly length?: number; - /** * Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum possible lease duration for secrets in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * In seconds, the maximum password time-to-live. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} */ readonly maxTtl?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} */ readonly namespace?: string; /** * Name of the password policy to use to generate passwords. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} */ readonly passwordPolicy?: string; /** * Timeout, in seconds, for the connection when making requests against the server before returning back an error. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} */ readonly requestTimeout?: number; /** * Issue a StartTLS command after establishing unencrypted connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} */ readonly starttls?: boolean | cdktf.IResolvable; /** * Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} */ readonly tlsMaxVersion?: string; /** * Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} */ readonly tlsMinVersion?: string; /** * In seconds, the default password time-to-live. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} */ readonly ttl?: number; /** * Enables userPrincipalDomain login with [username]@UPNDomain. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} */ readonly upndomain?: string; /** * LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} */ readonly url?: string; /** * In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} */ readonly usePre111GroupCnBehavior?: boolean | cdktf.IResolvable; /** * If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} */ readonly useTokenGroups?: boolean | cdktf.IResolvable; /** * Attribute used for users (default: cn) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} */ readonly userattr?: string; /** * LDAP domain to use for users (eg: ou=People,dc=example,dc=org) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} */ readonly userdn?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend vault_ad_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend vault_ad_secret_backend} */ export class AdSecretBackend extends cdktf.TerraformResource { @@ -254,7 +242,7 @@ export class AdSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a AdSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AdSecretBackend to import - * @param importFromId The id of the existing AdSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AdSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AdSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -266,7 +254,7 @@ export class AdSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_backend vault_ad_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_backend vault_ad_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -277,8 +265,8 @@ export class AdSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_ad_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -301,14 +289,12 @@ export class AdSecretBackend extends cdktf.TerraformResource { this._description = config.description; this._disableRemount = config.disableRemount; this._discoverdn = config.discoverdn; - this._formatter = config.formatter; this._groupattr = config.groupattr; this._groupdn = config.groupdn; this._groupfilter = config.groupfilter; this._id = config.id; this._insecureTls = config.insecureTls; this._lastRotationTolerance = config.lastRotationTolerance; - this._length = config.length; this._local = config.local; this._maxLeaseTtlSeconds = config.maxLeaseTtlSeconds; this._maxTtl = config.maxTtl; @@ -533,22 +519,6 @@ export class AdSecretBackend extends cdktf.TerraformResource { return this._discoverdn; } - // formatter - computed: true, optional: true, required: false - private _formatter?: string; - public get formatter() { - return this.getStringAttribute('formatter'); - } - public set formatter(value: string) { - this._formatter = value; - } - public resetFormatter() { - this._formatter = undefined; - } - // Temporarily expose input value. Use with caution. - public get formatterInput() { - return this._formatter; - } - // groupattr - computed: false, optional: true, required: false private _groupattr?: string; public get groupattr() { @@ -645,22 +615,6 @@ export class AdSecretBackend extends cdktf.TerraformResource { return this._lastRotationTolerance; } - // length - computed: true, optional: true, required: false - private _length?: number; - public get length() { - return this.getNumberAttribute('length'); - } - public set length(value: number) { - this._length = value; - } - public resetLength() { - this._length = undefined; - } - // Temporarily expose input value. Use with caution. - public get lengthInput() { - return this._length; - } - // local - computed: false, optional: true, required: false private _local?: boolean | cdktf.IResolvable; public get local() { @@ -936,14 +890,12 @@ export class AdSecretBackend extends cdktf.TerraformResource { description: cdktf.stringToTerraform(this._description), disable_remount: cdktf.booleanToTerraform(this._disableRemount), discoverdn: cdktf.booleanToTerraform(this._discoverdn), - formatter: cdktf.stringToTerraform(this._formatter), groupattr: cdktf.stringToTerraform(this._groupattr), groupdn: cdktf.stringToTerraform(this._groupdn), groupfilter: cdktf.stringToTerraform(this._groupfilter), id: cdktf.stringToTerraform(this._id), insecure_tls: cdktf.booleanToTerraform(this._insecureTls), last_rotation_tolerance: cdktf.numberToTerraform(this._lastRotationTolerance), - length: cdktf.numberToTerraform(this._length), local: cdktf.booleanToTerraform(this._local), max_lease_ttl_seconds: cdktf.numberToTerraform(this._maxLeaseTtlSeconds), max_ttl: cdktf.numberToTerraform(this._maxTtl), @@ -1043,12 +995,6 @@ export class AdSecretBackend extends cdktf.TerraformResource { type: "simple", storageClassType: "boolean", }, - formatter: { - value: cdktf.stringToHclTerraform(this._formatter), - isBlock: false, - type: "simple", - storageClassType: "string", - }, groupattr: { value: cdktf.stringToHclTerraform(this._groupattr), isBlock: false, @@ -1085,12 +1031,6 @@ export class AdSecretBackend extends cdktf.TerraformResource { type: "simple", storageClassType: "number", }, - length: { - value: cdktf.numberToHclTerraform(this._length), - isBlock: false, - type: "simple", - storageClassType: "number", - }, local: { value: cdktf.booleanToHclTerraform(this._local), isBlock: false, diff --git a/src/ad-secret-library/README.md b/src/ad-secret-library/README.md index 39a9bb1d..9c268d56 100644 --- a/src/ad-secret-library/README.md +++ b/src/ad-secret-library/README.md @@ -1,3 +1,3 @@ # `vault_ad_secret_library` -Refer to the Terraform Registry for docs: [`vault_ad_secret_library`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library). +Refer to the Terraform Registry for docs: [`vault_ad_secret_library`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library). diff --git a/src/ad-secret-library/index.ts b/src/ad-secret-library/index.ts index 917ef267..bcfaaa82 100644 --- a/src/ad-secret-library/index.ts +++ b/src/ad-secret-library/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface AdSecretLibraryConfig extends cdktf.TerraformMetaArguments { /** * The mount path for the AD backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} */ readonly backend: string; /** * Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} */ readonly disableCheckInEnforcement?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#id AdSecretLibrary#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#id AdSecretLibrary#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,37 +34,37 @@ export interface AdSecretLibraryConfig extends cdktf.TerraformMetaArguments { /** * The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} */ readonly maxTtl?: number; /** * The name of the set of service accounts. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} */ readonly namespace?: string; /** * The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} */ readonly serviceAccountNames: string[]; /** * The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} */ readonly ttl?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library vault_ad_secret_library} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library vault_ad_secret_library} */ export class AdSecretLibrary extends cdktf.TerraformResource { @@ -80,7 +80,7 @@ export class AdSecretLibrary extends cdktf.TerraformResource { * Generates CDKTF code for importing a AdSecretLibrary resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AdSecretLibrary to import - * @param importFromId The id of the existing AdSecretLibrary that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AdSecretLibrary that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AdSecretLibrary to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +92,7 @@ export class AdSecretLibrary extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_library vault_ad_secret_library} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_library vault_ad_secret_library} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +103,8 @@ export class AdSecretLibrary extends cdktf.TerraformResource { terraformResourceType: 'vault_ad_secret_library', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/ad-secret-role/README.md b/src/ad-secret-role/README.md index 6add7679..df9325b4 100644 --- a/src/ad-secret-role/README.md +++ b/src/ad-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_ad_secret_role` -Refer to the Terraform Registry for docs: [`vault_ad_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role). +Refer to the Terraform Registry for docs: [`vault_ad_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role). diff --git a/src/ad-secret-role/index.ts b/src/ad-secret-role/index.ts index fb3555fe..f45d2b9c 100644 --- a/src/ad-secret-role/index.ts +++ b/src/ad-secret-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface AdSecretRoleConfig extends cdktf.TerraformMetaArguments { /** * The mount path for the AD backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#id AdSecretRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#id AdSecretRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,31 +28,31 @@ export interface AdSecretRoleConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#role AdSecretRole#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#role AdSecretRole#role} */ readonly role: string; /** * The username/logon name for the service account with which this role will be associated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} */ readonly serviceAccountName: string; /** * In seconds, the default password time-to-live. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} */ readonly ttl?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role vault_ad_secret_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role vault_ad_secret_role} */ export class AdSecretRole extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class AdSecretRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a AdSecretRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AdSecretRole to import - * @param importFromId The id of the existing AdSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AdSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AdSecretRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class AdSecretRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ad_secret_role vault_ad_secret_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ad_secret_role vault_ad_secret_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class AdSecretRole extends cdktf.TerraformResource { terraformResourceType: 'vault_ad_secret_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/alicloud-auth-backend-role/README.md b/src/alicloud-auth-backend-role/README.md index 20b5a640..3ca65e15 100644 --- a/src/alicloud-auth-backend-role/README.md +++ b/src/alicloud-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_alicloud_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_alicloud_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_alicloud_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role). diff --git a/src/alicloud-auth-backend-role/index.ts b/src/alicloud-auth-backend-role/index.ts index 0bdc34d2..c8a56fae 100644 --- a/src/alicloud-auth-backend-role/index.ts +++ b/src/alicloud-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface AlicloudAuthBackendRoleConfig extends cdktf.TerraformMetaArgume /** * The role's arn. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} */ readonly arn: string; /** * Auth backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,73 +34,73 @@ export interface AlicloudAuthBackendRoleConfig extends cdktf.TerraformMetaArgume /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} */ readonly namespace?: string; /** * Name of the role. Must correspond with the name of the role reflected in the arn. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} */ readonly role: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role} */ export class AlicloudAuthBackendRole extends cdktf.TerraformResource { @@ -116,7 +116,7 @@ export class AlicloudAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a AlicloudAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AlicloudAuthBackendRole to import - * @param importFromId The id of the existing AlicloudAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AlicloudAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AlicloudAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -128,7 +128,7 @@ export class AlicloudAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -139,8 +139,8 @@ export class AlicloudAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_alicloud_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/approle-auth-backend-login/README.md b/src/approle-auth-backend-login/README.md index 2b4de079..8f05db7f 100644 --- a/src/approle-auth-backend-login/README.md +++ b/src/approle-auth-backend-login/README.md @@ -1,3 +1,3 @@ # `vault_approle_auth_backend_login` -Refer to the Terraform Registry for docs: [`vault_approle_auth_backend_login`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login). +Refer to the Terraform Registry for docs: [`vault_approle_auth_backend_login`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login). diff --git a/src/approle-auth-backend-login/index.ts b/src/approle-auth-backend-login/index.ts index 6ff75177..f83f20c8 100644 --- a/src/approle-auth-backend-login/index.ts +++ b/src/approle-auth-backend-login/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface ApproleAuthBackendLoginConfig extends cdktf.TerraformMetaArgume /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface ApproleAuthBackendLoginConfig extends cdktf.TerraformMetaArgume /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} */ readonly namespace?: string; /** * The RoleID to log in with. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} */ readonly roleId: string; /** * The SecretID to log in with. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} */ readonly secretId?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login} */ export class ApproleAuthBackendLogin extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class ApproleAuthBackendLogin extends cdktf.TerraformResource { * Generates CDKTF code for importing a ApproleAuthBackendLogin resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the ApproleAuthBackendLogin to import - * @param importFromId The id of the existing ApproleAuthBackendLogin that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing ApproleAuthBackendLogin that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the ApproleAuthBackendLogin to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class ApproleAuthBackendLogin extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class ApproleAuthBackendLogin extends cdktf.TerraformResource { terraformResourceType: 'vault_approle_auth_backend_login', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/approle-auth-backend-role-secret-id/README.md b/src/approle-auth-backend-role-secret-id/README.md index edc8fd56..9abaf891 100644 --- a/src/approle-auth-backend-role-secret-id/README.md +++ b/src/approle-auth-backend-role-secret-id/README.md @@ -1,3 +1,3 @@ # `vault_approle_auth_backend_role_secret_id` -Refer to the Terraform Registry for docs: [`vault_approle_auth_backend_role_secret_id`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id). +Refer to the Terraform Registry for docs: [`vault_approle_auth_backend_role_secret_id`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id). diff --git a/src/approle-auth-backend-role-secret-id/index.ts b/src/approle-auth-backend-role-secret-id/index.ts index 5ee3cbd3..1cad368d 100644 --- a/src/approle-auth-backend-role-secret-id/index.ts +++ b/src/approle-auth-backend-role-secret-id/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface ApproleAuthBackendRoleSecretIdConfig extends cdktf.TerraformMet /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} */ readonly backend?: string; /** * List of CIDR blocks that can log in using the SecretID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} */ readonly cidrList?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,43 +34,43 @@ export interface ApproleAuthBackendRoleSecretIdConfig extends cdktf.TerraformMet /** * JSON-encoded secret data to write. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} */ readonly metadata?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} */ readonly roleName: string; /** * The SecretID to be managed. If not specified, Vault auto-generates one. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} */ readonly secretId?: string; /** * Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} */ readonly withWrappedAccessor?: boolean | cdktf.IResolvable; /** * The TTL duration of the wrapped SecretID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} */ readonly wrappingTtl?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id} */ export class ApproleAuthBackendRoleSecretId extends cdktf.TerraformResource { @@ -86,7 +86,7 @@ export class ApproleAuthBackendRoleSecretId extends cdktf.TerraformResource { * Generates CDKTF code for importing a ApproleAuthBackendRoleSecretId resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the ApproleAuthBackendRoleSecretId to import - * @param importFromId The id of the existing ApproleAuthBackendRoleSecretId that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing ApproleAuthBackendRoleSecretId that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the ApproleAuthBackendRoleSecretId to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -98,7 +98,7 @@ export class ApproleAuthBackendRoleSecretId extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -109,8 +109,8 @@ export class ApproleAuthBackendRoleSecretId extends cdktf.TerraformResource { terraformResourceType: 'vault_approle_auth_backend_role_secret_id', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/approle-auth-backend-role/README.md b/src/approle-auth-backend-role/README.md index ceb00a74..559c60ef 100644 --- a/src/approle-auth-backend-role/README.md +++ b/src/approle-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_approle_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_approle_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_approle_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role). diff --git a/src/approle-auth-backend-role/index.ts b/src/approle-auth-backend-role/index.ts index e2275bb5..765950c9 100644 --- a/src/approle-auth-backend-role/index.ts +++ b/src/approle-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface ApproleAuthBackendRoleConfig extends cdktf.TerraformMetaArgumen /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} */ readonly backend?: string; /** * Whether or not to require secret_id to be present when logging in using this AppRole. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} */ readonly bindSecretId?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,97 +34,97 @@ export interface ApproleAuthBackendRoleConfig extends cdktf.TerraformMetaArgumen /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} */ readonly namespace?: string; /** * The RoleID of the role. Autogenerated if not set. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} */ readonly roleId?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} */ readonly roleName: string; /** * List of CIDR blocks that can log in using the AppRole. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} */ readonly secretIdBoundCidrs?: string[]; /** * Number of times which a particular SecretID can be used to fetch a token from this AppRole, after which the SecretID will expire. Leaving this unset or setting it to 0 will allow unlimited uses. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} */ readonly secretIdNumUses?: number; /** * Number of seconds a SecretID remains valid for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} */ readonly secretIdTtl?: number; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role} */ export class ApproleAuthBackendRole extends cdktf.TerraformResource { @@ -140,7 +140,7 @@ export class ApproleAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a ApproleAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the ApproleAuthBackendRole to import - * @param importFromId The id of the existing ApproleAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing ApproleAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the ApproleAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -152,7 +152,7 @@ export class ApproleAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -163,8 +163,8 @@ export class ApproleAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_approle_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/audit-request-header/README.md b/src/audit-request-header/README.md index 7ef47916..8af70dec 100644 --- a/src/audit-request-header/README.md +++ b/src/audit-request-header/README.md @@ -1,3 +1,3 @@ # `vault_audit_request_header` -Refer to the Terraform Registry for docs: [`vault_audit_request_header`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header). +Refer to the Terraform Registry for docs: [`vault_audit_request_header`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header). diff --git a/src/audit-request-header/index.ts b/src/audit-request-header/index.ts index de2a4812..3285a3d5 100644 --- a/src/audit-request-header/index.ts +++ b/src/audit-request-header/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface AuditRequestHeaderConfig extends cdktf.TerraformMetaArguments { /** * Whether this header's value should be HMAC'd in the audit logs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} */ readonly hmac?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#id AuditRequestHeader#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#id AuditRequestHeader#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface AuditRequestHeaderConfig extends cdktf.TerraformMetaArguments { /** * The name of the request header to audit. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#name AuditRequestHeader#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#name AuditRequestHeader#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header vault_audit_request_header} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header vault_audit_request_header} */ export class AuditRequestHeader extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class AuditRequestHeader extends cdktf.TerraformResource { * Generates CDKTF code for importing a AuditRequestHeader resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AuditRequestHeader to import - * @param importFromId The id of the existing AuditRequestHeader that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AuditRequestHeader that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AuditRequestHeader to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class AuditRequestHeader extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit_request_header vault_audit_request_header} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit_request_header vault_audit_request_header} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class AuditRequestHeader extends cdktf.TerraformResource { terraformResourceType: 'vault_audit_request_header', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/audit/README.md b/src/audit/README.md index 93b7c4fc..be62d734 100644 --- a/src/audit/README.md +++ b/src/audit/README.md @@ -1,3 +1,3 @@ # `vault_audit` -Refer to the Terraform Registry for docs: [`vault_audit`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit). +Refer to the Terraform Registry for docs: [`vault_audit`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit). diff --git a/src/audit/index.ts b/src/audit/index.ts index 443bd485..d628fdf1 100644 --- a/src/audit/index.ts +++ b/src/audit/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface AuditConfig extends cdktf.TerraformMetaArguments { /** * Human-friendly description of the audit device. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#description Audit#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#description Audit#description} */ readonly description?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#id Audit#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#id Audit#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,37 +28,37 @@ export interface AuditConfig extends cdktf.TerraformMetaArguments { /** * Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#local Audit#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#local Audit#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#namespace Audit#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#namespace Audit#namespace} */ readonly namespace?: string; /** * Configuration options to pass to the audit device itself. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#options Audit#options} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#options Audit#options} */ readonly options: { [key: string]: string }; /** * Path in which to enable the audit device. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#path Audit#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#path Audit#path} */ readonly path?: string; /** * Type of the audit device, such as 'file'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#type Audit#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#type Audit#type} */ readonly type: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit vault_audit} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit vault_audit} */ export class Audit extends cdktf.TerraformResource { @@ -74,7 +74,7 @@ export class Audit extends cdktf.TerraformResource { * Generates CDKTF code for importing a Audit resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the Audit to import - * @param importFromId The id of the existing Audit that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing Audit that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the Audit to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class Audit extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/audit vault_audit} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/audit vault_audit} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class Audit extends cdktf.TerraformResource { terraformResourceType: 'vault_audit', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/auth-backend/README.md b/src/auth-backend/README.md index 33ee2b0c..c822197c 100644 --- a/src/auth-backend/README.md +++ b/src/auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_auth_backend` -Refer to the Terraform Registry for docs: [`vault_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend). +Refer to the Terraform Registry for docs: [`vault_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend). diff --git a/src/auth-backend/index.ts b/src/auth-backend/index.ts index 436ea754..8cbb95ca 100644 --- a/src/auth-backend/index.ts +++ b/src/auth-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface AuthBackendConfig extends cdktf.TerraformMetaArguments { /** * The description of the auth backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#description AuthBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#description AuthBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#id AuthBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#id AuthBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,63 +34,63 @@ export interface AuthBackendConfig extends cdktf.TerraformMetaArguments { /** * Specifies if the auth method is local only * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#local AuthBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#local AuthBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#namespace AuthBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#namespace AuthBackend#namespace} */ readonly namespace?: string; /** * path to mount the backend. This defaults to the type. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#path AuthBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#path AuthBackend#path} */ readonly path?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#tune AuthBackend#tune} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#tune AuthBackend#tune} */ readonly tune?: AuthBackendTune[] | cdktf.IResolvable; /** * Name of the auth backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#type AuthBackend#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#type AuthBackend#type} */ readonly type: string; } export interface AuthBackendTune { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers} */ readonly allowedResponseHeaders?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys} */ readonly auditNonHmacRequestKeys?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys} */ readonly auditNonHmacResponseKeys?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl} */ readonly defaultLeaseTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility} */ readonly listingVisibility?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl} */ readonly maxLeaseTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers} */ readonly passthroughRequestHeaders?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#token_type AuthBackend#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#token_type AuthBackend#token_type} */ readonly tokenType?: string; } @@ -409,7 +409,7 @@ export class AuthBackendTuneList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend vault_auth_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend vault_auth_backend} */ export class AuthBackend extends cdktf.TerraformResource { @@ -425,7 +425,7 @@ export class AuthBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a AuthBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AuthBackend to import - * @param importFromId The id of the existing AuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AuthBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -437,7 +437,7 @@ export class AuthBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/auth_backend vault_auth_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/auth_backend vault_auth_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -448,8 +448,8 @@ export class AuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-auth-backend-cert/README.md b/src/aws-auth-backend-cert/README.md index f8ac154f..40ecb6b9 100644 --- a/src/aws-auth-backend-cert/README.md +++ b/src/aws-auth-backend-cert/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_cert` -Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_cert`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_cert`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert). diff --git a/src/aws-auth-backend-cert/index.ts b/src/aws-auth-backend-cert/index.ts index 5d97e0fb..5c9430ff 100644 --- a/src/aws-auth-backend-cert/index.ts +++ b/src/aws-auth-backend-cert/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface AwsAuthBackendCertConfig extends cdktf.TerraformMetaArguments { /** * Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} */ readonly awsPublicCert: string; /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} */ readonly backend?: string; /** * Name of the certificate to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} */ readonly certName: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,19 +40,19 @@ export interface AwsAuthBackendCertConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} */ readonly namespace?: string; /** * The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} */ readonly type?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert} */ export class AwsAuthBackendCert extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class AwsAuthBackendCert extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsAuthBackendCert resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsAuthBackendCert to import - * @param importFromId The id of the existing AwsAuthBackendCert that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsAuthBackendCert that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsAuthBackendCert to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class AwsAuthBackendCert extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class AwsAuthBackendCert extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_cert', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-auth-backend-client/README.md b/src/aws-auth-backend-client/README.md index a5e2ca82..880d9a89 100644 --- a/src/aws-auth-backend-client/README.md +++ b/src/aws-auth-backend-client/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_client` -Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_client`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_client`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client). diff --git a/src/aws-auth-backend-client/index.ts b/src/aws-auth-backend-client/index.ts index 8322c55d..97515e76 100644 --- a/src/aws-auth-backend-client/index.ts +++ b/src/aws-auth-backend-client/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface AwsAuthBackendClientConfig extends cdktf.TerraformMetaArguments /** * AWS Access key with permissions to query AWS APIs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} */ readonly accessKey?: string; /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} */ readonly backend?: string; /** * URL to override the default generated endpoint for making AWS EC2 API calls. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} */ readonly ec2Endpoint?: string; /** * URL to override the default generated endpoint for making AWS IAM API calls. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} */ readonly iamEndpoint?: string; /** * The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} */ readonly iamServerIdHeaderValue?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,37 +52,37 @@ export interface AwsAuthBackendClientConfig extends cdktf.TerraformMetaArguments /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} */ readonly namespace?: string; /** * AWS Secret key with permissions to query AWS APIs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} */ readonly secretKey?: string; /** * URL to override the default generated endpoint for making AWS STS API calls. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} */ readonly stsEndpoint?: string; /** * Region to override the default region for making AWS STS API calls. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} */ readonly stsRegion?: string; /** * If set, will override sts_region and use the region from the client request's header * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} */ readonly useStsRegionFromClient?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client} */ export class AwsAuthBackendClient extends cdktf.TerraformResource { @@ -98,7 +98,7 @@ export class AwsAuthBackendClient extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsAuthBackendClient resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsAuthBackendClient to import - * @param importFromId The id of the existing AwsAuthBackendClient that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsAuthBackendClient that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsAuthBackendClient to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -110,7 +110,7 @@ export class AwsAuthBackendClient extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -121,8 +121,8 @@ export class AwsAuthBackendClient extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_client', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-auth-backend-config-identity/README.md b/src/aws-auth-backend-config-identity/README.md index 442f4a78..ee719204 100644 --- a/src/aws-auth-backend-config-identity/README.md +++ b/src/aws-auth-backend-config-identity/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_config_identity` -Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_config_identity`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_config_identity`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity). diff --git a/src/aws-auth-backend-config-identity/index.ts b/src/aws-auth-backend-config-identity/index.ts index 83b72ffa..83c5352e 100644 --- a/src/aws-auth-backend-config-identity/index.ts +++ b/src/aws-auth-backend-config-identity/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface AwsAuthBackendConfigIdentityConfig extends cdktf.TerraformMetaA /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} */ readonly backend?: string; /** * Configures how to generate the identity alias when using the ec2 auth method. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} */ readonly ec2Alias?: string; /** * The metadata to include on the token returned by the login endpoint. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} */ readonly ec2Metadata?: string[]; /** * How to generate the identity alias when using the iam auth method. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} */ readonly iamAlias?: string; /** * The metadata to include on the token returned by the login endpoint. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} */ readonly iamMetadata?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,13 +52,13 @@ export interface AwsAuthBackendConfigIdentityConfig extends cdktf.TerraformMetaA /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity} */ export class AwsAuthBackendConfigIdentity extends cdktf.TerraformResource { @@ -74,7 +74,7 @@ export class AwsAuthBackendConfigIdentity extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsAuthBackendConfigIdentity resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsAuthBackendConfigIdentity to import - * @param importFromId The id of the existing AwsAuthBackendConfigIdentity that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsAuthBackendConfigIdentity that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsAuthBackendConfigIdentity to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class AwsAuthBackendConfigIdentity extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class AwsAuthBackendConfigIdentity extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_config_identity', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-auth-backend-identity-whitelist/README.md b/src/aws-auth-backend-identity-whitelist/README.md index ca60d950..fda17860 100644 --- a/src/aws-auth-backend-identity-whitelist/README.md +++ b/src/aws-auth-backend-identity-whitelist/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_identity_whitelist` -Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_identity_whitelist`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_identity_whitelist`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist). diff --git a/src/aws-auth-backend-identity-whitelist/index.ts b/src/aws-auth-backend-identity-whitelist/index.ts index c5edf5dc..02aba32b 100644 --- a/src/aws-auth-backend-identity-whitelist/index.ts +++ b/src/aws-auth-backend-identity-whitelist/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface AwsAuthBackendIdentityWhitelistConfig extends cdktf.TerraformMe /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} */ readonly backend?: string; /** * If true, disables the periodic tidying of the identiy whitelist entries. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} */ readonly disablePeriodicTidy?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,19 +34,19 @@ export interface AwsAuthBackendIdentityWhitelistConfig extends cdktf.TerraformMe /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} */ readonly namespace?: string; /** * The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} */ readonly safetyBuffer?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist} */ export class AwsAuthBackendIdentityWhitelist extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class AwsAuthBackendIdentityWhitelist extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsAuthBackendIdentityWhitelist resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsAuthBackendIdentityWhitelist to import - * @param importFromId The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsAuthBackendIdentityWhitelist to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class AwsAuthBackendIdentityWhitelist extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class AwsAuthBackendIdentityWhitelist extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_identity_whitelist', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-auth-backend-login/README.md b/src/aws-auth-backend-login/README.md index 09948cb2..769d0afc 100644 --- a/src/aws-auth-backend-login/README.md +++ b/src/aws-auth-backend-login/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_login` -Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_login`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_login`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login). diff --git a/src/aws-auth-backend-login/index.ts b/src/aws-auth-backend-login/index.ts index 900a0593..dfd941d2 100644 --- a/src/aws-auth-backend-login/index.ts +++ b/src/aws-auth-backend-login/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface AwsAuthBackendLoginConfig extends cdktf.TerraformMetaArguments /** * AWS Auth Backend to read the token from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} */ readonly backend?: string; /** * The HTTP method used in the signed request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} */ readonly iamHttpRequestMethod?: string; /** * The Base64-encoded body of the signed request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} */ readonly iamRequestBody?: string; /** * The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} */ readonly iamRequestHeaders?: string; /** * The Base64-encoded HTTP URL used in the signed request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} */ readonly iamRequestUrl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,43 +52,43 @@ export interface AwsAuthBackendLoginConfig extends cdktf.TerraformMetaArguments /** * Base64-encoded EC2 instance identity document to authenticate with. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} */ readonly identity?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} */ readonly namespace?: string; /** * The nonce to be used for subsequent login requests. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} */ readonly nonce?: string; /** * PKCS7 signature of the identity document to authenticate with, with all newline characters removed. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} */ readonly pkcs7?: string; /** * AWS Auth Role to read the token from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} */ readonly role?: string; /** * Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} */ readonly signature?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login} */ export class AwsAuthBackendLogin extends cdktf.TerraformResource { @@ -104,7 +104,7 @@ export class AwsAuthBackendLogin extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsAuthBackendLogin resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsAuthBackendLogin to import - * @param importFromId The id of the existing AwsAuthBackendLogin that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsAuthBackendLogin that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsAuthBackendLogin to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -116,7 +116,7 @@ export class AwsAuthBackendLogin extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -127,8 +127,8 @@ export class AwsAuthBackendLogin extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_login', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-auth-backend-role-tag/README.md b/src/aws-auth-backend-role-tag/README.md index 6c201436..dee7c4b8 100644 --- a/src/aws-auth-backend-role-tag/README.md +++ b/src/aws-auth-backend-role-tag/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_role_tag` -Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_role_tag`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_role_tag`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag). diff --git a/src/aws-auth-backend-role-tag/index.ts b/src/aws-auth-backend-role-tag/index.ts index 70598d9d..5fb3f775 100644 --- a/src/aws-auth-backend-role-tag/index.ts +++ b/src/aws-auth-backend-role-tag/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface AwsAuthBackendRoleTagConfig extends cdktf.TerraformMetaArgument /** * Allows migration of the underlying instance where the client resides. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} */ readonly allowInstanceMigration?: boolean | cdktf.IResolvable; /** * AWS auth backend to read tags from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} */ readonly backend?: string; /** * Only allow a single token to be granted per instance ID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} */ readonly disallowReauthentication?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,37 +40,37 @@ export interface AwsAuthBackendRoleTagConfig extends cdktf.TerraformMetaArgument /** * Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} */ readonly instanceId?: string; /** * The maximum allowed lifetime of tokens issued using this role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} */ readonly maxTtl?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} */ readonly namespace?: string; /** * Policies to be associated with the tag. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} */ readonly policies?: string[]; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} */ readonly role: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag} */ export class AwsAuthBackendRoleTag extends cdktf.TerraformResource { @@ -86,7 +86,7 @@ export class AwsAuthBackendRoleTag extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsAuthBackendRoleTag resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsAuthBackendRoleTag to import - * @param importFromId The id of the existing AwsAuthBackendRoleTag that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsAuthBackendRoleTag that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsAuthBackendRoleTag to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -98,7 +98,7 @@ export class AwsAuthBackendRoleTag extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -109,8 +109,8 @@ export class AwsAuthBackendRoleTag extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_role_tag', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-auth-backend-role/README.md b/src/aws-auth-backend-role/README.md index a15a8cc6..8384e291 100644 --- a/src/aws-auth-backend-role/README.md +++ b/src/aws-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role). diff --git a/src/aws-auth-backend-role/index.ts b/src/aws-auth-backend-role/index.ts index 6e34a5fa..611065ad 100644 --- a/src/aws-auth-backend-role/index.ts +++ b/src/aws-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,83 +15,83 @@ export interface AwsAuthBackendRoleConfig extends cdktf.TerraformMetaArguments { /** * When true, allows migration of the underlying instance where the client resides. Use with caution. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} */ readonly allowInstanceMigration?: boolean | cdktf.IResolvable; /** * The auth type permitted for this role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} */ readonly authType?: string; /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} */ readonly backend?: string; /** * Only EC2 instances with this account ID in their identity document will be permitted to log in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} */ readonly boundAccountIds?: string[]; /** * Only EC2 instances using this AMI ID will be permitted to log in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} */ readonly boundAmiIds?: string[]; /** * Only EC2 instances that match this instance ID will be permitted to log in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} */ readonly boundEc2InstanceIds?: string[]; /** * Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} */ readonly boundIamInstanceProfileArns?: string[]; /** * The IAM principal that must be authenticated using the iam auth method. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} */ readonly boundIamPrincipalArns?: string[]; /** * Only EC2 instances that match this IAM role ARN will be permitted to log in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} */ readonly boundIamRoleArns?: string[]; /** * Only EC2 instances in this region will be permitted to log in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} */ readonly boundRegions?: string[]; /** * Only EC2 instances associated with this subnet ID will be permitted to log in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} */ readonly boundSubnetIds?: string[]; /** * Only EC2 instances associated with this VPC ID will be permitted to log in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} */ readonly boundVpcIds?: string[]; /** * When true, only allows a single token to be granted per instance ID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} */ readonly disallowReauthentication?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -100,97 +100,97 @@ export interface AwsAuthBackendRoleConfig extends cdktf.TerraformMetaArguments { /** * The region to search for the inferred entities in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} */ readonly inferredAwsRegion?: string; /** * The type of inferencing Vault should do. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} */ readonly inferredEntityType?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} */ readonly namespace?: string; /** * Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique ID. When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} */ readonly resolveAwsUniqueIds?: boolean | cdktf.IResolvable; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} */ readonly role: string; /** * The key of the tag on EC2 instance to use for role tags. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} */ readonly roleTag?: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role} */ export class AwsAuthBackendRole extends cdktf.TerraformResource { @@ -206,7 +206,7 @@ export class AwsAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsAuthBackendRole to import - * @param importFromId The id of the existing AwsAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -218,7 +218,7 @@ export class AwsAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -229,8 +229,8 @@ export class AwsAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-auth-backend-roletag-blacklist/README.md b/src/aws-auth-backend-roletag-blacklist/README.md index 41b53620..efa915ed 100644 --- a/src/aws-auth-backend-roletag-blacklist/README.md +++ b/src/aws-auth-backend-roletag-blacklist/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_roletag_blacklist` -Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_roletag_blacklist`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_roletag_blacklist`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist). diff --git a/src/aws-auth-backend-roletag-blacklist/index.ts b/src/aws-auth-backend-roletag-blacklist/index.ts index f1027c59..5614882e 100644 --- a/src/aws-auth-backend-roletag-blacklist/index.ts +++ b/src/aws-auth-backend-roletag-blacklist/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface AwsAuthBackendRoletagBlacklistConfig extends cdktf.TerraformMet /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} */ readonly backend: string; /** * If true, disables the periodic tidying of the roletag blacklist entries. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} */ readonly disablePeriodicTidy?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,19 +34,19 @@ export interface AwsAuthBackendRoletagBlacklistConfig extends cdktf.TerraformMet /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} */ readonly namespace?: string; /** * The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} */ readonly safetyBuffer?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist} */ export class AwsAuthBackendRoletagBlacklist extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class AwsAuthBackendRoletagBlacklist extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsAuthBackendRoletagBlacklist resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsAuthBackendRoletagBlacklist to import - * @param importFromId The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsAuthBackendRoletagBlacklist to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class AwsAuthBackendRoletagBlacklist extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class AwsAuthBackendRoletagBlacklist extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_roletag_blacklist', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-auth-backend-sts-role/README.md b/src/aws-auth-backend-sts-role/README.md index 87247016..ea12640c 100644 --- a/src/aws-auth-backend-sts-role/README.md +++ b/src/aws-auth-backend-sts-role/README.md @@ -1,3 +1,3 @@ # `vault_aws_auth_backend_sts_role` -Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_sts_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role). +Refer to the Terraform Registry for docs: [`vault_aws_auth_backend_sts_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role). diff --git a/src/aws-auth-backend-sts-role/index.ts b/src/aws-auth-backend-sts-role/index.ts index ec05a9b3..5e8942af 100644 --- a/src/aws-auth-backend-sts-role/index.ts +++ b/src/aws-auth-backend-sts-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface AwsAuthBackendStsRoleConfig extends cdktf.TerraformMetaArgument /** * AWS account ID to be associated with STS role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} */ readonly accountId: string; /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,19 +34,19 @@ export interface AwsAuthBackendStsRoleConfig extends cdktf.TerraformMetaArgument /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} */ readonly namespace?: string; /** * AWS ARN for STS role to be assumed when interacting with the account specified. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} */ readonly stsRole: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role} */ export class AwsAuthBackendStsRole extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class AwsAuthBackendStsRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsAuthBackendStsRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsAuthBackendStsRole to import - * @param importFromId The id of the existing AwsAuthBackendStsRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsAuthBackendStsRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsAuthBackendStsRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class AwsAuthBackendStsRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class AwsAuthBackendStsRole extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_auth_backend_sts_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-secret-backend-role/README.md b/src/aws-secret-backend-role/README.md index eddbf0cb..bb26f2ac 100644 --- a/src/aws-secret-backend-role/README.md +++ b/src/aws-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_aws_secret_backend_role` -Refer to the Terraform Registry for docs: [`vault_aws_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_aws_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role). diff --git a/src/aws-secret-backend-role/index.ts b/src/aws-secret-backend-role/index.ts index a16df3f3..57e45dcd 100644 --- a/src/aws-secret-backend-role/index.ts +++ b/src/aws-secret-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,29 +15,29 @@ export interface AwsSecretBackendRoleConfig extends cdktf.TerraformMetaArguments /** * The path of the AWS Secret Backend the role belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} */ readonly backend: string; /** * Role credential type. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} */ readonly credentialType: string; /** * The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} */ readonly defaultStsTtl?: number; /** * A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} */ readonly iamGroups?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -46,55 +46,55 @@ export interface AwsSecretBackendRoleConfig extends cdktf.TerraformMetaArguments /** * The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). Valid only when credential_type is one of assumed_role or federation_token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} */ readonly maxStsTtl?: number; /** * Unique name for the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} */ readonly namespace?: string; /** * The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} */ readonly permissionsBoundaryArn?: string; /** * ARN for an existing IAM policy the role should use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} */ readonly policyArns?: string[]; /** * IAM policy the role should use in JSON format. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} */ readonly policyDocument?: string; /** * ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} */ readonly roleArns?: string[]; /** * The path for the user name. Valid only when credential_type is iam_user. Default is / * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} */ readonly userPath?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role} */ export class AwsSecretBackendRole extends cdktf.TerraformResource { @@ -110,7 +110,7 @@ export class AwsSecretBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsSecretBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsSecretBackendRole to import - * @param importFromId The id of the existing AwsSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsSecretBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -122,7 +122,7 @@ export class AwsSecretBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -133,8 +133,8 @@ export class AwsSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-secret-backend-static-role/README.md b/src/aws-secret-backend-static-role/README.md index 26c2d340..bab115b4 100644 --- a/src/aws-secret-backend-static-role/README.md +++ b/src/aws-secret-backend-static-role/README.md @@ -1,3 +1,3 @@ # `vault_aws_secret_backend_static_role` -Refer to the Terraform Registry for docs: [`vault_aws_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role). +Refer to the Terraform Registry for docs: [`vault_aws_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role). diff --git a/src/aws-secret-backend-static-role/index.ts b/src/aws-secret-backend-static-role/index.ts index 016e1c95..d0280a2f 100644 --- a/src/aws-secret-backend-static-role/index.ts +++ b/src/aws-secret-backend-static-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface AwsSecretBackendStaticRoleConfig extends cdktf.TerraformMetaArg /** * The path where the AWS secrets backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,31 +28,31 @@ export interface AwsSecretBackendStaticRoleConfig extends cdktf.TerraformMetaArg /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} */ readonly namespace?: string; /** * How often Vault should rotate the password of the user entry. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} */ readonly rotationPeriod: number; /** * The username of the existing AWS IAM user to manage password rotation for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} */ readonly username: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role} */ export class AwsSecretBackendStaticRole extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class AwsSecretBackendStaticRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsSecretBackendStaticRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsSecretBackendStaticRole to import - * @param importFromId The id of the existing AwsSecretBackendStaticRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsSecretBackendStaticRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsSecretBackendStaticRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class AwsSecretBackendStaticRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class AwsSecretBackendStaticRole extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_secret_backend_static_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/aws-secret-backend/README.md b/src/aws-secret-backend/README.md index 111e92b6..e064d313 100644 --- a/src/aws-secret-backend/README.md +++ b/src/aws-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_aws_secret_backend` -Refer to the Terraform Registry for docs: [`vault_aws_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend). +Refer to the Terraform Registry for docs: [`vault_aws_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend). diff --git a/src/aws-secret-backend/index.ts b/src/aws-secret-backend/index.ts index 2da1f389..33b00f67 100644 --- a/src/aws-secret-backend/index.ts +++ b/src/aws-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface AwsSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * The AWS Access Key ID to use when generating new credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} */ readonly accessKey?: string; /** * Default lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** * Specifies a custom HTTP IAM endpoint to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} */ readonly iamEndpoint?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,79 +52,79 @@ export interface AwsSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * The audience claim value. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} */ readonly identityTokenAudience?: string; /** * The key to use for signing identity tokens. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} */ readonly identityTokenKey?: string; /** * The TTL of generated identity tokens in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} */ readonly identityTokenTtl?: number; /** * Specifies if the secret backend is local only * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum possible lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} */ readonly namespace?: string; /** * Path to mount the backend at. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} */ readonly path?: string; /** * The AWS region to make API calls against. Defaults to us-east-1. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} */ readonly region?: string; /** * Role ARN to assume for plugin identity token federation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} */ readonly roleArn?: string; /** * The AWS Secret Access Key to use when generating new credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} */ readonly secretKey?: string; /** * Specifies a custom HTTP STS endpoint to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} */ readonly stsEndpoint?: string; /** * Template describing how dynamic usernames are generated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} */ readonly usernameTemplate?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend vault_aws_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend vault_aws_secret_backend} */ export class AwsSecretBackend extends cdktf.TerraformResource { @@ -140,7 +140,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a AwsSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AwsSecretBackend to import - * @param importFromId The id of the existing AwsSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AwsSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AwsSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -152,7 +152,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/aws_secret_backend vault_aws_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/aws_secret_backend vault_aws_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -163,8 +163,8 @@ export class AwsSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_aws_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/azure-auth-backend-config/README.md b/src/azure-auth-backend-config/README.md index 4b53ef27..d71c1a6a 100644 --- a/src/azure-auth-backend-config/README.md +++ b/src/azure-auth-backend-config/README.md @@ -1,3 +1,3 @@ # `vault_azure_auth_backend_config` -Refer to the Terraform Registry for docs: [`vault_azure_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config). +Refer to the Terraform Registry for docs: [`vault_azure_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config). diff --git a/src/azure-auth-backend-config/index.ts b/src/azure-auth-backend-config/index.ts index 45442ccf..4da873fe 100644 --- a/src/azure-auth-backend-config/index.ts +++ b/src/azure-auth-backend-config/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,29 +15,29 @@ export interface AzureAuthBackendConfigConfig extends cdktf.TerraformMetaArgumen /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} */ readonly backend?: string; /** * The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} */ readonly clientId?: string; /** * The client secret for credentials to query the Azure APIs * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} */ readonly clientSecret?: string; /** * The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} */ readonly environment?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -46,25 +46,25 @@ export interface AzureAuthBackendConfigConfig extends cdktf.TerraformMetaArgumen /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} */ readonly namespace?: string; /** * The configured URL for the application registered in Azure Active Directory. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} */ readonly resource: string; /** * The tenant id for the Azure Active Directory organization. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} */ readonly tenantId: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config} */ export class AzureAuthBackendConfig extends cdktf.TerraformResource { @@ -80,7 +80,7 @@ export class AzureAuthBackendConfig extends cdktf.TerraformResource { * Generates CDKTF code for importing a AzureAuthBackendConfig resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AzureAuthBackendConfig to import - * @param importFromId The id of the existing AzureAuthBackendConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AzureAuthBackendConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AzureAuthBackendConfig to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +92,7 @@ export class AzureAuthBackendConfig extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +103,8 @@ export class AzureAuthBackendConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_azure_auth_backend_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/azure-auth-backend-role/README.md b/src/azure-auth-backend-role/README.md index d592a829..12063fea 100644 --- a/src/azure-auth-backend-role/README.md +++ b/src/azure-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_azure_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_azure_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_azure_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role). diff --git a/src/azure-auth-backend-role/index.ts b/src/azure-auth-backend-role/index.ts index 0445b829..8186918a 100644 --- a/src/azure-auth-backend-role/index.ts +++ b/src/azure-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,47 +15,47 @@ export interface AzureAuthBackendRoleConfig extends cdktf.TerraformMetaArguments /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} */ readonly backend?: string; /** * The list of group ids that login is restricted to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} */ readonly boundGroupIds?: string[]; /** * The list of locations that login is restricted to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} */ readonly boundLocations?: string[]; /** * The list of resource groups that login is restricted to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} */ readonly boundResourceGroups?: string[]; /** * The list of scale set names that the login is restricted to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} */ readonly boundScaleSets?: string[]; /** * The list of Service Principal IDs that login is restricted to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} */ readonly boundServicePrincipalIds?: string[]; /** * The list of subscription IDs that login is restricted to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} */ readonly boundSubscriptionIds?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -64,73 +64,73 @@ export interface AzureAuthBackendRoleConfig extends cdktf.TerraformMetaArguments /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} */ readonly role: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role} */ export class AzureAuthBackendRole extends cdktf.TerraformResource { @@ -146,7 +146,7 @@ export class AzureAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a AzureAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AzureAuthBackendRole to import - * @param importFromId The id of the existing AzureAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AzureAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AzureAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -158,7 +158,7 @@ export class AzureAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -169,8 +169,8 @@ export class AzureAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_azure_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/azure-secret-backend-role/README.md b/src/azure-secret-backend-role/README.md index f6145b62..208003a2 100644 --- a/src/azure-secret-backend-role/README.md +++ b/src/azure-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_azure_secret_backend_role` -Refer to the Terraform Registry for docs: [`vault_azure_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_azure_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role). diff --git a/src/azure-secret-backend-role/index.ts b/src/azure-secret-backend-role/index.ts index c55c0ef2..46cde31f 100644 --- a/src/azure-secret-backend-role/index.ts +++ b/src/azure-secret-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface AzureSecretBackendRoleConfig extends cdktf.TerraformMetaArgumen /** * Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} */ readonly applicationObjectId?: string; /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} */ readonly backend?: string; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} */ readonly description?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,61 +40,61 @@ export interface AzureSecretBackendRoleConfig extends cdktf.TerraformMetaArgumen /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} */ readonly maxTtl?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} */ readonly namespace?: string; /** * Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} */ readonly permanentlyDelete?: boolean | cdktf.IResolvable; /** * Name of the role to create * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} */ readonly role: string; /** * Specifies the security principal types that are allowed to sign in to the application. Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} */ readonly signInAudience?: string; /** * Comma-separated strings of Azure tags to attach to an application. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} */ readonly tags?: string[]; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} */ readonly ttl?: string; /** * azure_groups block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} */ readonly azureGroups?: AzureSecretBackendRoleAzureGroups[] | cdktf.IResolvable; /** * azure_roles block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} */ readonly azureRoles?: AzureSecretBackendRoleAzureRoles[] | cdktf.IResolvable; } export interface AzureSecretBackendRoleAzureGroups { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name} */ readonly groupName: string; } @@ -212,15 +212,15 @@ export class AzureSecretBackendRoleAzureGroupsList extends cdktf.ComplexList { } export interface AzureSecretBackendRoleAzureRoles { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id} */ readonly roleId?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name} */ readonly roleName?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope} */ readonly scope: string; } @@ -391,7 +391,7 @@ export class AzureSecretBackendRoleAzureRolesList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role} */ export class AzureSecretBackendRole extends cdktf.TerraformResource { @@ -407,7 +407,7 @@ export class AzureSecretBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a AzureSecretBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AzureSecretBackendRole to import - * @param importFromId The id of the existing AzureSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AzureSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AzureSecretBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -419,7 +419,7 @@ export class AzureSecretBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -430,8 +430,8 @@ export class AzureSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_azure_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/azure-secret-backend/README.md b/src/azure-secret-backend/README.md index c01d9e49..059db658 100644 --- a/src/azure-secret-backend/README.md +++ b/src/azure-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_azure_secret_backend` -Refer to the Terraform Registry for docs: [`vault_azure_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend). +Refer to the Terraform Registry for docs: [`vault_azure_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend). diff --git a/src/azure-secret-backend/index.ts b/src/azure-secret-backend/index.ts index d7ddcc3c..02207967 100644 --- a/src/azure-secret-backend/index.ts +++ b/src/azure-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface AzureSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} */ readonly clientId?: string; /** * The client secret for credentials to query the Azure APIs * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} */ readonly clientSecret?: string; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** * The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} */ readonly environment?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,37 +52,37 @@ export interface AzureSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} */ readonly namespace?: string; /** * Path to mount the backend at. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} */ readonly path?: string; /** * The subscription id for the Azure Active Directory. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} */ readonly subscriptionId: string; /** * The tenant id for the Azure Active Directory organization. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} */ readonly tenantId: string; /** * Use the Microsoft Graph API. Should be set to true on vault-1.10+ * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} */ readonly useMicrosoftGraphApi?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend vault_azure_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend vault_azure_secret_backend} */ export class AzureSecretBackend extends cdktf.TerraformResource { @@ -98,7 +98,7 @@ export class AzureSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a AzureSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the AzureSecretBackend to import - * @param importFromId The id of the existing AzureSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing AzureSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the AzureSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -110,7 +110,7 @@ export class AzureSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/azure_secret_backend vault_azure_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/azure_secret_backend vault_azure_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -121,8 +121,8 @@ export class AzureSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_azure_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/cert-auth-backend-role/README.md b/src/cert-auth-backend-role/README.md index c9c365dc..ba974e51 100644 --- a/src/cert-auth-backend-role/README.md +++ b/src/cert-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_cert_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_cert_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_cert_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role). diff --git a/src/cert-auth-backend-role/index.ts b/src/cert-auth-backend-role/index.ts index 6c597567..c3485a2e 100644 --- a/src/cert-auth-backend-role/index.ts +++ b/src/cert-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,154 +13,150 @@ import * as cdktf from 'cdktf'; export interface CertAuthBackendRoleConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names} */ readonly allowedCommonNames?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans} */ readonly allowedDnsSans?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans} */ readonly allowedEmailSans?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names} */ readonly allowedNames?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organization_units CertAuthBackendRole#allowed_organization_units} - */ - readonly allowedOrganizationUnits?: string[]; - /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units} */ readonly allowedOrganizationalUnits?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans} */ readonly allowedUriSans?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate} */ readonly certificate: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name} */ readonly displayName?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. */ readonly id?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} */ readonly namespace?: string; /** * Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} */ readonly ocspCaCertificates?: string; /** * If enabled, validate certificates' revocation status using OCSP. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} */ readonly ocspEnabled?: boolean | cdktf.IResolvable; /** * If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} */ readonly ocspFailOpen?: boolean | cdktf.IResolvable; /** * If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} */ readonly ocspQueryAllServers?: boolean | cdktf.IResolvable; /** * A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} */ readonly ocspServersOverride?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions} */ readonly requiredExtensions?: string[]; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role} */ export class CertAuthBackendRole extends cdktf.TerraformResource { @@ -176,7 +172,7 @@ export class CertAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a CertAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the CertAuthBackendRole to import - * @param importFromId The id of the existing CertAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing CertAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the CertAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -188,7 +184,7 @@ export class CertAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -199,8 +195,8 @@ export class CertAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_cert_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -214,7 +210,6 @@ export class CertAuthBackendRole extends cdktf.TerraformResource { this._allowedDnsSans = config.allowedDnsSans; this._allowedEmailSans = config.allowedEmailSans; this._allowedNames = config.allowedNames; - this._allowedOrganizationUnits = config.allowedOrganizationUnits; this._allowedOrganizationalUnits = config.allowedOrganizationalUnits; this._allowedUriSans = config.allowedUriSans; this._backend = config.backend; @@ -308,22 +303,6 @@ export class CertAuthBackendRole extends cdktf.TerraformResource { return this._allowedNames; } - // allowed_organization_units - computed: true, optional: true, required: false - private _allowedOrganizationUnits?: string[]; - public get allowedOrganizationUnits() { - return cdktf.Fn.tolist(this.getListAttribute('allowed_organization_units')); - } - public set allowedOrganizationUnits(value: string[]) { - this._allowedOrganizationUnits = value; - } - public resetAllowedOrganizationUnits() { - this._allowedOrganizationUnits = undefined; - } - // Temporarily expose input value. Use with caution. - public get allowedOrganizationUnitsInput() { - return this._allowedOrganizationUnits; - } - // allowed_organizational_units - computed: false, optional: true, required: false private _allowedOrganizationalUnits?: string[]; public get allowedOrganizationalUnits() { @@ -696,7 +675,6 @@ export class CertAuthBackendRole extends cdktf.TerraformResource { allowed_dns_sans: cdktf.listMapper(cdktf.stringToTerraform, false)(this._allowedDnsSans), allowed_email_sans: cdktf.listMapper(cdktf.stringToTerraform, false)(this._allowedEmailSans), allowed_names: cdktf.listMapper(cdktf.stringToTerraform, false)(this._allowedNames), - allowed_organization_units: cdktf.listMapper(cdktf.stringToTerraform, false)(this._allowedOrganizationUnits), allowed_organizational_units: cdktf.listMapper(cdktf.stringToTerraform, false)(this._allowedOrganizationalUnits), allowed_uri_sans: cdktf.listMapper(cdktf.stringToTerraform, false)(this._allowedUriSans), backend: cdktf.stringToTerraform(this._backend), @@ -749,12 +727,6 @@ export class CertAuthBackendRole extends cdktf.TerraformResource { type: "set", storageClassType: "stringList", }, - allowed_organization_units: { - value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedOrganizationUnits), - isBlock: false, - type: "set", - storageClassType: "stringList", - }, allowed_organizational_units: { value: cdktf.listMapperHcl(cdktf.stringToHclTerraform, false)(this._allowedOrganizationalUnits), isBlock: false, diff --git a/src/consul-secret-backend-role/README.md b/src/consul-secret-backend-role/README.md index 8803896a..3cfaf62b 100644 --- a/src/consul-secret-backend-role/README.md +++ b/src/consul-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_consul_secret_backend_role` -Refer to the Terraform Registry for docs: [`vault_consul_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_consul_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role). diff --git a/src/consul-secret-backend-role/index.ts b/src/consul-secret-backend-role/index.ts index 32f65335..8f089e32 100644 --- a/src/consul-secret-backend-role/index.ts +++ b/src/consul-secret-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,29 +15,29 @@ export interface ConsulSecretBackendRoleConfig extends cdktf.TerraformMetaArgume /** * The path of the Consul Secret Backend the role belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} */ readonly backend?: string; /** * The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+ * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} */ readonly consulNamespace?: string; /** * List of Consul policies to associate with this role * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} */ readonly consulPolicies?: string[]; /** * Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+ * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} */ readonly consulRoles?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -46,69 +46,63 @@ export interface ConsulSecretBackendRoleConfig extends cdktf.TerraformMetaArgume /** * Indicates that the token should not be replicated globally and instead be local to the current datacenter. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum TTL for leases associated with this role, in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} */ readonly maxTtl?: number; /** * The name of an existing role against which to create this Consul credential * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} */ readonly namespace?: string; /** * Set of Consul node identities to attach to * the token. Applicable for Vault 1.11+ with Consul 1.8+ * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} */ readonly nodeIdentities?: string[]; /** * The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+ * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} */ readonly partition?: string; /** * List of Consul policies to associate with this role * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} */ readonly policies?: string[]; /** * Set of Consul service identities to attach to * the token. Applicable for Vault 1.11+ with Consul 1.5+ * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} */ readonly serviceIdentities?: string[]; /** - * Specifies the type of token to create when using this role. Valid values are "client" or "management". - * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type} - */ - readonly tokenType?: string; - /** * Specifies the TTL for this role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} */ readonly ttl?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role} */ export class ConsulSecretBackendRole extends cdktf.TerraformResource { @@ -124,7 +118,7 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a ConsulSecretBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the ConsulSecretBackendRole to import - * @param importFromId The id of the existing ConsulSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing ConsulSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the ConsulSecretBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -136,7 +130,7 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -147,8 +141,8 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_consul_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -171,7 +165,6 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource { this._partition = config.partition; this._policies = config.policies; this._serviceIdentities = config.serviceIdentities; - this._tokenType = config.tokenType; this._ttl = config.ttl; } @@ -384,22 +377,6 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource { return this._serviceIdentities; } - // token_type - computed: false, optional: true, required: false - private _tokenType?: string; - public get tokenType() { - return this.getStringAttribute('token_type'); - } - public set tokenType(value: string) { - this._tokenType = value; - } - public resetTokenType() { - this._tokenType = undefined; - } - // Temporarily expose input value. Use with caution. - public get tokenTypeInput() { - return this._tokenType; - } - // ttl - computed: false, optional: true, required: false private _ttl?: number; public get ttl() { @@ -435,7 +412,6 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource { partition: cdktf.stringToTerraform(this._partition), policies: cdktf.listMapper(cdktf.stringToTerraform, false)(this._policies), service_identities: cdktf.listMapper(cdktf.stringToTerraform, false)(this._serviceIdentities), - token_type: cdktf.stringToTerraform(this._tokenType), ttl: cdktf.numberToTerraform(this._ttl), }; } @@ -520,12 +496,6 @@ export class ConsulSecretBackendRole extends cdktf.TerraformResource { type: "set", storageClassType: "stringList", }, - token_type: { - value: cdktf.stringToHclTerraform(this._tokenType), - isBlock: false, - type: "simple", - storageClassType: "string", - }, ttl: { value: cdktf.numberToHclTerraform(this._ttl), isBlock: false, diff --git a/src/consul-secret-backend/README.md b/src/consul-secret-backend/README.md index 4f62d61f..38414fd5 100644 --- a/src/consul-secret-backend/README.md +++ b/src/consul-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_consul_secret_backend` -Refer to the Terraform Registry for docs: [`vault_consul_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend). +Refer to the Terraform Registry for docs: [`vault_consul_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend). diff --git a/src/consul-secret-backend/index.ts b/src/consul-secret-backend/index.ts index acc9ada5..6a333d5c 100644 --- a/src/consul-secret-backend/index.ts +++ b/src/consul-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,53 +15,53 @@ export interface ConsulSecretBackendConfig extends cdktf.TerraformMetaArguments /** * Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} */ readonly address: string; /** * Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} */ readonly bootstrap?: boolean | cdktf.IResolvable; /** * CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} */ readonly caCert?: string; /** * Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} */ readonly clientCert?: string; /** * Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} */ readonly clientKey?: string; /** * Default lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -70,43 +70,43 @@ export interface ConsulSecretBackendConfig extends cdktf.TerraformMetaArguments /** * Specifies if the secret backend is local only * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum possible lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} */ readonly namespace?: string; /** * Unique name of the Vault Consul mount to configure * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} */ readonly path?: string; /** * Specifies the URL scheme to use. Defaults to "http". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} */ readonly scheme?: string; /** * Specifies the Consul token to use when managing or issuing new tokens. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} */ readonly token?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend vault_consul_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend vault_consul_secret_backend} */ export class ConsulSecretBackend extends cdktf.TerraformResource { @@ -122,7 +122,7 @@ export class ConsulSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a ConsulSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the ConsulSecretBackend to import - * @param importFromId The id of the existing ConsulSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing ConsulSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the ConsulSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -134,7 +134,7 @@ export class ConsulSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/consul_secret_backend vault_consul_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/consul_secret_backend vault_consul_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -145,8 +145,8 @@ export class ConsulSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_consul_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-ad-access-credentials/README.md b/src/data-vault-ad-access-credentials/README.md index 38127c12..ade3efa3 100644 --- a/src/data-vault-ad-access-credentials/README.md +++ b/src/data-vault-ad-access-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_ad_access_credentials` -Refer to the Terraform Registry for docs: [`data_vault_ad_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials). +Refer to the Terraform Registry for docs: [`data_vault_ad_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials). diff --git a/src/data-vault-ad-access-credentials/index.ts b/src/data-vault-ad-access-credentials/index.ts index b1903004..50209f3b 100644 --- a/src/data-vault-ad-access-credentials/index.ts +++ b/src/data-vault-ad-access-credentials/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultAdAccessCredentialsConfig extends cdktf.TerraformMetaA /** * AD Secret Backend to read credentials from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface DataVaultAdAccessCredentialsConfig extends cdktf.TerraformMetaA /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} */ readonly role: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials} */ export class DataVaultAdAccessCredentials extends cdktf.TerraformDataSource { @@ -56,7 +56,7 @@ export class DataVaultAdAccessCredentials extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultAdAccessCredentials resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultAdAccessCredentials to import - * @param importFromId The id of the existing DataVaultAdAccessCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultAdAccessCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultAdAccessCredentials to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class DataVaultAdAccessCredentials extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class DataVaultAdAccessCredentials extends cdktf.TerraformDataSource { terraformResourceType: 'vault_ad_access_credentials', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-approle-auth-backend-role-id/README.md b/src/data-vault-approle-auth-backend-role-id/README.md index 8a5fbc09..990a7935 100644 --- a/src/data-vault-approle-auth-backend-role-id/README.md +++ b/src/data-vault-approle-auth-backend-role-id/README.md @@ -1,3 +1,3 @@ # `data_vault_approle_auth_backend_role_id` -Refer to the Terraform Registry for docs: [`data_vault_approle_auth_backend_role_id`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id). +Refer to the Terraform Registry for docs: [`data_vault_approle_auth_backend_role_id`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id). diff --git a/src/data-vault-approle-auth-backend-role-id/index.ts b/src/data-vault-approle-auth-backend-role-id/index.ts index 8adcad3d..2d232109 100644 --- a/src/data-vault-approle-auth-backend-role-id/index.ts +++ b/src/data-vault-approle-auth-backend-role-id/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultApproleAuthBackendRoleIdConfig extends cdktf.Terraform /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface DataVaultApproleAuthBackendRoleIdConfig extends cdktf.Terraform /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} */ readonly roleName: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id} */ export class DataVaultApproleAuthBackendRoleId extends cdktf.TerraformDataSource { @@ -56,7 +56,7 @@ export class DataVaultApproleAuthBackendRoleId extends cdktf.TerraformDataSource * Generates CDKTF code for importing a DataVaultApproleAuthBackendRoleId resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultApproleAuthBackendRoleId to import - * @param importFromId The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultApproleAuthBackendRoleId to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class DataVaultApproleAuthBackendRoleId extends cdktf.TerraformDataSource // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class DataVaultApproleAuthBackendRoleId extends cdktf.TerraformDataSource terraformResourceType: 'vault_approle_auth_backend_role_id', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-auth-backend/README.md b/src/data-vault-auth-backend/README.md index 4e04b672..961c7936 100644 --- a/src/data-vault-auth-backend/README.md +++ b/src/data-vault-auth-backend/README.md @@ -1,3 +1,3 @@ # `data_vault_auth_backend` -Refer to the Terraform Registry for docs: [`data_vault_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend). +Refer to the Terraform Registry for docs: [`data_vault_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend). diff --git a/src/data-vault-auth-backend/index.ts b/src/data-vault-auth-backend/index.ts index 5a4ade74..fb0489be 100644 --- a/src/data-vault-auth-backend/index.ts +++ b/src/data-vault-auth-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultAuthBackendConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,19 +22,19 @@ export interface DataVaultAuthBackendConfig extends cdktf.TerraformMetaArguments /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} */ readonly namespace?: string; /** * The auth backend mount point. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} */ readonly path: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend vault_auth_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend vault_auth_backend} */ export class DataVaultAuthBackend extends cdktf.TerraformDataSource { @@ -50,7 +50,7 @@ export class DataVaultAuthBackend extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultAuthBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultAuthBackend to import - * @param importFromId The id of the existing DataVaultAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultAuthBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class DataVaultAuthBackend extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backend vault_auth_backend} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backend vault_auth_backend} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class DataVaultAuthBackend extends cdktf.TerraformDataSource { terraformResourceType: 'vault_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-auth-backends/README.md b/src/data-vault-auth-backends/README.md index 4c520ac8..dc864b86 100644 --- a/src/data-vault-auth-backends/README.md +++ b/src/data-vault-auth-backends/README.md @@ -1,3 +1,3 @@ # `data_vault_auth_backends` -Refer to the Terraform Registry for docs: [`data_vault_auth_backends`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends). +Refer to the Terraform Registry for docs: [`data_vault_auth_backends`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends). diff --git a/src/data-vault-auth-backends/index.ts b/src/data-vault-auth-backends/index.ts index f3021620..194f9118 100644 --- a/src/data-vault-auth-backends/index.ts +++ b/src/data-vault-auth-backends/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultAuthBackendsConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,19 +22,19 @@ export interface DataVaultAuthBackendsConfig extends cdktf.TerraformMetaArgument /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} */ readonly namespace?: string; /** * The type of the auth backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} */ readonly type?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends vault_auth_backends} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends vault_auth_backends} */ export class DataVaultAuthBackends extends cdktf.TerraformDataSource { @@ -50,7 +50,7 @@ export class DataVaultAuthBackends extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultAuthBackends resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultAuthBackends to import - * @param importFromId The id of the existing DataVaultAuthBackends that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultAuthBackends that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultAuthBackends to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class DataVaultAuthBackends extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/auth_backends vault_auth_backends} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/auth_backends vault_auth_backends} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class DataVaultAuthBackends extends cdktf.TerraformDataSource { terraformResourceType: 'vault_auth_backends', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-aws-access-credentials/README.md b/src/data-vault-aws-access-credentials/README.md index 2ea566cb..999ce7bc 100644 --- a/src/data-vault-aws-access-credentials/README.md +++ b/src/data-vault-aws-access-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_aws_access_credentials` -Refer to the Terraform Registry for docs: [`data_vault_aws_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials). +Refer to the Terraform Registry for docs: [`data_vault_aws_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials). diff --git a/src/data-vault-aws-access-credentials/index.ts b/src/data-vault-aws-access-credentials/index.ts index f20b600b..38b82bac 100644 --- a/src/data-vault-aws-access-credentials/index.ts +++ b/src/data-vault-aws-access-credentials/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultAwsAccessCredentialsConfig extends cdktf.TerraformMeta /** * AWS Secret Backend to read credentials from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,43 +28,43 @@ export interface DataVaultAwsAccessCredentialsConfig extends cdktf.TerraformMeta /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} */ readonly namespace?: string; /** * Region the read credentials belong to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} */ readonly region?: string; /** * AWS Secret Role to read credentials from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} */ readonly role: string; /** * ARN to use if multiple are available in the role. Required if the role has multiple ARNs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} */ readonly roleArn?: string; /** * User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} */ readonly ttl?: string; /** * Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} */ readonly type?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials} */ export class DataVaultAwsAccessCredentials extends cdktf.TerraformDataSource { @@ -80,7 +80,7 @@ export class DataVaultAwsAccessCredentials extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultAwsAccessCredentials resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultAwsAccessCredentials to import - * @param importFromId The id of the existing DataVaultAwsAccessCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultAwsAccessCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultAwsAccessCredentials to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +92,7 @@ export class DataVaultAwsAccessCredentials extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +103,8 @@ export class DataVaultAwsAccessCredentials extends cdktf.TerraformDataSource { terraformResourceType: 'vault_aws_access_credentials', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-aws-static-access-credentials/README.md b/src/data-vault-aws-static-access-credentials/README.md index 1944cac9..802cc572 100644 --- a/src/data-vault-aws-static-access-credentials/README.md +++ b/src/data-vault-aws-static-access-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_aws_static_access_credentials` -Refer to the Terraform Registry for docs: [`data_vault_aws_static_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials). +Refer to the Terraform Registry for docs: [`data_vault_aws_static_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials). diff --git a/src/data-vault-aws-static-access-credentials/index.ts b/src/data-vault-aws-static-access-credentials/index.ts index ce557214..c8e08fba 100644 --- a/src/data-vault-aws-static-access-credentials/index.ts +++ b/src/data-vault-aws-static-access-credentials/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultAwsStaticAccessCredentialsConfig extends cdktf.Terrafo /** * AWS Secret Backend to read credentials from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface DataVaultAwsStaticAccessCredentialsConfig extends cdktf.Terrafo /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials} */ export class DataVaultAwsStaticAccessCredentials extends cdktf.TerraformDataSource { @@ -56,7 +56,7 @@ export class DataVaultAwsStaticAccessCredentials extends cdktf.TerraformDataSour * Generates CDKTF code for importing a DataVaultAwsStaticAccessCredentials resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultAwsStaticAccessCredentials to import - * @param importFromId The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultAwsStaticAccessCredentials to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class DataVaultAwsStaticAccessCredentials extends cdktf.TerraformDataSour // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class DataVaultAwsStaticAccessCredentials extends cdktf.TerraformDataSour terraformResourceType: 'vault_aws_static_access_credentials', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-azure-access-credentials/README.md b/src/data-vault-azure-access-credentials/README.md index 6b6789bd..9e4984ad 100644 --- a/src/data-vault-azure-access-credentials/README.md +++ b/src/data-vault-azure-access-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_azure_access_credentials` -Refer to the Terraform Registry for docs: [`data_vault_azure_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials). +Refer to the Terraform Registry for docs: [`data_vault_azure_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials). diff --git a/src/data-vault-azure-access-credentials/index.ts b/src/data-vault-azure-access-credentials/index.ts index e3871f30..3cc66cee 100644 --- a/src/data-vault-azure-access-credentials/index.ts +++ b/src/data-vault-azure-access-credentials/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,7 +15,7 @@ export interface DataVaultAzureAccessCredentialsConfig extends cdktf.TerraformMe /** * Azure Secret Backend to read credentials from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} */ readonly backend: string; /** @@ -23,11 +23,11 @@ export interface DataVaultAzureAccessCredentialsConfig extends cdktf.TerraformMe * Defaults to the environment configured in the Vault backend. * Some possible values: AzurePublicCloud, AzureUSGovernmentCloud * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} */ readonly environment?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -36,55 +36,55 @@ export interface DataVaultAzureAccessCredentialsConfig extends cdktf.TerraformMe /** * If 'validate_creds' is true, the number of seconds after which to give up validating credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} */ readonly maxCredValidationSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} */ readonly namespace?: string; /** * If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} */ readonly numSecondsBetweenTests?: number; /** * If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} */ readonly numSequentialSuccesses?: number; /** * Azure Secret Role to read credentials from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} */ readonly role: string; /** * The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} */ readonly subscriptionId?: string; /** * The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} */ readonly tenantId?: string; /** * Whether generated credentials should be validated before being returned. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} */ readonly validateCreds?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials} */ export class DataVaultAzureAccessCredentials extends cdktf.TerraformDataSource { @@ -100,7 +100,7 @@ export class DataVaultAzureAccessCredentials extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultAzureAccessCredentials resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultAzureAccessCredentials to import - * @param importFromId The id of the existing DataVaultAzureAccessCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultAzureAccessCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultAzureAccessCredentials to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -112,7 +112,7 @@ export class DataVaultAzureAccessCredentials extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -123,8 +123,8 @@ export class DataVaultAzureAccessCredentials extends cdktf.TerraformDataSource { terraformResourceType: 'vault_azure_access_credentials', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-gcp-auth-backend-role/README.md b/src/data-vault-gcp-auth-backend-role/README.md index f8b4d0a1..5721c177 100644 --- a/src/data-vault-gcp-auth-backend-role/README.md +++ b/src/data-vault-gcp-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `data_vault_gcp_auth_backend_role` -Refer to the Terraform Registry for docs: [`data_vault_gcp_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role). +Refer to the Terraform Registry for docs: [`data_vault_gcp_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role). diff --git a/src/data-vault-gcp-auth-backend-role/index.ts b/src/data-vault-gcp-auth-backend-role/index.ts index 9549ab8a..e0c90b4a 100644 --- a/src/data-vault-gcp-auth-backend-role/index.ts +++ b/src/data-vault-gcp-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultGcpAuthBackendRoleConfig extends cdktf.TerraformMetaAr /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,73 +28,73 @@ export interface DataVaultGcpAuthBackendRoleConfig extends cdktf.TerraformMetaAr /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} */ readonly roleName: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role} */ export class DataVaultGcpAuthBackendRole extends cdktf.TerraformDataSource { @@ -110,7 +110,7 @@ export class DataVaultGcpAuthBackendRole extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultGcpAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultGcpAuthBackendRole to import - * @param importFromId The id of the existing DataVaultGcpAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultGcpAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultGcpAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -122,7 +122,7 @@ export class DataVaultGcpAuthBackendRole extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -133,8 +133,8 @@ export class DataVaultGcpAuthBackendRole extends cdktf.TerraformDataSource { terraformResourceType: 'vault_gcp_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-generic-secret/README.md b/src/data-vault-generic-secret/README.md index 7cc598d0..062c1659 100644 --- a/src/data-vault-generic-secret/README.md +++ b/src/data-vault-generic-secret/README.md @@ -1,3 +1,3 @@ # `data_vault_generic_secret` -Refer to the Terraform Registry for docs: [`data_vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret). +Refer to the Terraform Registry for docs: [`data_vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret). diff --git a/src/data-vault-generic-secret/index.ts b/src/data-vault-generic-secret/index.ts index 8e0fb434..539ce6b9 100644 --- a/src/data-vault-generic-secret/index.ts +++ b/src/data-vault-generic-secret/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultGenericSecretConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,29 +22,29 @@ export interface DataVaultGenericSecretConfig extends cdktf.TerraformMetaArgumen /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} */ readonly namespace?: string; /** * Full path from which a secret will be read. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} */ readonly path: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version} */ readonly version?: number; /** * If set to true, stores 'lease_start_time' in the TF state. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} */ readonly withLeaseStartTime?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret vault_generic_secret} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret vault_generic_secret} */ export class DataVaultGenericSecret extends cdktf.TerraformDataSource { @@ -60,7 +60,7 @@ export class DataVaultGenericSecret extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultGenericSecret resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultGenericSecret to import - * @param importFromId The id of the existing DataVaultGenericSecret that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultGenericSecret that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultGenericSecret to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -72,7 +72,7 @@ export class DataVaultGenericSecret extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/generic_secret vault_generic_secret} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/generic_secret vault_generic_secret} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -83,8 +83,8 @@ export class DataVaultGenericSecret extends cdktf.TerraformDataSource { terraformResourceType: 'vault_generic_secret', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-identity-entity/README.md b/src/data-vault-identity-entity/README.md index b95cf8eb..b53056dd 100644 --- a/src/data-vault-identity-entity/README.md +++ b/src/data-vault-identity-entity/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_entity` -Refer to the Terraform Registry for docs: [`data_vault_identity_entity`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity). +Refer to the Terraform Registry for docs: [`data_vault_identity_entity`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity). diff --git a/src/data-vault-identity-entity/index.ts b/src/data-vault-identity-entity/index.ts index b4dbc39a..cb9da53a 100644 --- a/src/data-vault-identity-entity/index.ts +++ b/src/data-vault-identity-entity/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface DataVaultIdentityEntityConfig extends cdktf.TerraformMetaArgume /** * ID of the alias. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} */ readonly aliasId?: string; /** * Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} */ readonly aliasMountAccessor?: string; /** * Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} */ readonly aliasName?: string; /** * ID of the entity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} */ readonly entityId?: string; /** * Name of the entity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} */ readonly entityName?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,7 +52,7 @@ export interface DataVaultIdentityEntityConfig extends cdktf.TerraformMetaArgume /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} */ readonly namespace?: string; } @@ -179,7 +179,7 @@ export class DataVaultIdentityEntityAliasesList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity vault_identity_entity} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity vault_identity_entity} */ export class DataVaultIdentityEntity extends cdktf.TerraformDataSource { @@ -195,7 +195,7 @@ export class DataVaultIdentityEntity extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultIdentityEntity resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultIdentityEntity to import - * @param importFromId The id of the existing DataVaultIdentityEntity that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultIdentityEntity that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultIdentityEntity to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -207,7 +207,7 @@ export class DataVaultIdentityEntity extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_entity vault_identity_entity} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_entity vault_identity_entity} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -218,8 +218,8 @@ export class DataVaultIdentityEntity extends cdktf.TerraformDataSource { terraformResourceType: 'vault_identity_entity', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-identity-group/README.md b/src/data-vault-identity-group/README.md index 44b75c1c..651ba684 100644 --- a/src/data-vault-identity-group/README.md +++ b/src/data-vault-identity-group/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_group` -Refer to the Terraform Registry for docs: [`data_vault_identity_group`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group). +Refer to the Terraform Registry for docs: [`data_vault_identity_group`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group). diff --git a/src/data-vault-identity-group/index.ts b/src/data-vault-identity-group/index.ts index 23a612a6..593ad8dd 100644 --- a/src/data-vault-identity-group/index.ts +++ b/src/data-vault-identity-group/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface DataVaultIdentityGroupConfig extends cdktf.TerraformMetaArgumen /** * ID of the alias. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} */ readonly aliasId?: string; /** * Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} */ readonly aliasMountAccessor?: string; /** * Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} */ readonly aliasName?: string; /** * ID of the group. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} */ readonly groupId?: string; /** * Name of the group. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} */ readonly groupName?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,13 +52,13 @@ export interface DataVaultIdentityGroupConfig extends cdktf.TerraformMetaArgumen /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group vault_identity_group} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group vault_identity_group} */ export class DataVaultIdentityGroup extends cdktf.TerraformDataSource { @@ -74,7 +74,7 @@ export class DataVaultIdentityGroup extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultIdentityGroup resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultIdentityGroup to import - * @param importFromId The id of the existing DataVaultIdentityGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultIdentityGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultIdentityGroup to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class DataVaultIdentityGroup extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_group vault_identity_group} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_group vault_identity_group} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class DataVaultIdentityGroup extends cdktf.TerraformDataSource { terraformResourceType: 'vault_identity_group', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-identity-oidc-client-creds/README.md b/src/data-vault-identity-oidc-client-creds/README.md index 83554491..e535d400 100644 --- a/src/data-vault-identity-oidc-client-creds/README.md +++ b/src/data-vault-identity-oidc-client-creds/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_oidc_client_creds` -Refer to the Terraform Registry for docs: [`data_vault_identity_oidc_client_creds`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds). +Refer to the Terraform Registry for docs: [`data_vault_identity_oidc_client_creds`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds). diff --git a/src/data-vault-identity-oidc-client-creds/index.ts b/src/data-vault-identity-oidc-client-creds/index.ts index 4fe2710d..6085b35c 100644 --- a/src/data-vault-identity-oidc-client-creds/index.ts +++ b/src/data-vault-identity-oidc-client-creds/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultIdentityOidcClientCredsConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,19 +22,19 @@ export interface DataVaultIdentityOidcClientCredsConfig extends cdktf.TerraformM /** * The name of the client. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds} */ export class DataVaultIdentityOidcClientCreds extends cdktf.TerraformDataSource { @@ -50,7 +50,7 @@ export class DataVaultIdentityOidcClientCreds extends cdktf.TerraformDataSource * Generates CDKTF code for importing a DataVaultIdentityOidcClientCreds resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultIdentityOidcClientCreds to import - * @param importFromId The id of the existing DataVaultIdentityOidcClientCreds that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultIdentityOidcClientCreds that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultIdentityOidcClientCreds to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class DataVaultIdentityOidcClientCreds extends cdktf.TerraformDataSource // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class DataVaultIdentityOidcClientCreds extends cdktf.TerraformDataSource terraformResourceType: 'vault_identity_oidc_client_creds', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-identity-oidc-openid-config/README.md b/src/data-vault-identity-oidc-openid-config/README.md index 22065e23..ccbca321 100644 --- a/src/data-vault-identity-oidc-openid-config/README.md +++ b/src/data-vault-identity-oidc-openid-config/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_oidc_openid_config` -Refer to the Terraform Registry for docs: [`data_vault_identity_oidc_openid_config`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config). +Refer to the Terraform Registry for docs: [`data_vault_identity_oidc_openid_config`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config). diff --git a/src/data-vault-identity-oidc-openid-config/index.ts b/src/data-vault-identity-oidc-openid-config/index.ts index 097ad91e..e0f399ab 100644 --- a/src/data-vault-identity-oidc-openid-config/index.ts +++ b/src/data-vault-identity-oidc-openid-config/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultIdentityOidcOpenidConfigConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,19 +22,19 @@ export interface DataVaultIdentityOidcOpenidConfigConfig extends cdktf.Terraform /** * The name of the provider. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config} */ export class DataVaultIdentityOidcOpenidConfig extends cdktf.TerraformDataSource { @@ -50,7 +50,7 @@ export class DataVaultIdentityOidcOpenidConfig extends cdktf.TerraformDataSource * Generates CDKTF code for importing a DataVaultIdentityOidcOpenidConfig resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultIdentityOidcOpenidConfig to import - * @param importFromId The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultIdentityOidcOpenidConfig to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class DataVaultIdentityOidcOpenidConfig extends cdktf.TerraformDataSource // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class DataVaultIdentityOidcOpenidConfig extends cdktf.TerraformDataSource terraformResourceType: 'vault_identity_oidc_openid_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-identity-oidc-public-keys/README.md b/src/data-vault-identity-oidc-public-keys/README.md index 3e3cce52..2dfa02a1 100644 --- a/src/data-vault-identity-oidc-public-keys/README.md +++ b/src/data-vault-identity-oidc-public-keys/README.md @@ -1,3 +1,3 @@ # `data_vault_identity_oidc_public_keys` -Refer to the Terraform Registry for docs: [`data_vault_identity_oidc_public_keys`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys). +Refer to the Terraform Registry for docs: [`data_vault_identity_oidc_public_keys`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys). diff --git a/src/data-vault-identity-oidc-public-keys/index.ts b/src/data-vault-identity-oidc-public-keys/index.ts index efe6c61b..624040e1 100644 --- a/src/data-vault-identity-oidc-public-keys/index.ts +++ b/src/data-vault-identity-oidc-public-keys/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultIdentityOidcPublicKeysConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,19 +22,19 @@ export interface DataVaultIdentityOidcPublicKeysConfig extends cdktf.TerraformMe /** * The name of the provider. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys} */ export class DataVaultIdentityOidcPublicKeys extends cdktf.TerraformDataSource { @@ -50,7 +50,7 @@ export class DataVaultIdentityOidcPublicKeys extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultIdentityOidcPublicKeys resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultIdentityOidcPublicKeys to import - * @param importFromId The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultIdentityOidcPublicKeys to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class DataVaultIdentityOidcPublicKeys extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class DataVaultIdentityOidcPublicKeys extends cdktf.TerraformDataSource { terraformResourceType: 'vault_identity_oidc_public_keys', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-kubernetes-auth-backend-config/README.md b/src/data-vault-kubernetes-auth-backend-config/README.md index 7554136a..5cfff911 100644 --- a/src/data-vault-kubernetes-auth-backend-config/README.md +++ b/src/data-vault-kubernetes-auth-backend-config/README.md @@ -1,3 +1,3 @@ # `data_vault_kubernetes_auth_backend_config` -Refer to the Terraform Registry for docs: [`data_vault_kubernetes_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config). +Refer to the Terraform Registry for docs: [`data_vault_kubernetes_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config). diff --git a/src/data-vault-kubernetes-auth-backend-config/index.ts b/src/data-vault-kubernetes-auth-backend-config/index.ts index 38c6d97f..cbc3d24e 100644 --- a/src/data-vault-kubernetes-auth-backend-config/index.ts +++ b/src/data-vault-kubernetes-auth-backend-config/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface DataVaultKubernetesAuthBackendConfigConfig extends cdktf.Terraf /** * Unique name of the kubernetes backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} */ readonly backend?: string; /** * Optional disable JWT issuer validation. Allows to skip ISS validation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} */ readonly disableIssValidation?: boolean | cdktf.IResolvable; /** * Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} */ readonly disableLocalCaJwt?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,37 +40,37 @@ export interface DataVaultKubernetesAuthBackendConfigConfig extends cdktf.Terraf /** * Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} */ readonly issuer?: string; /** * PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} */ readonly kubernetesCaCert?: string; /** * Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} */ readonly kubernetesHost?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} */ readonly namespace?: string; /** * Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} */ readonly pemKeys?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config} */ export class DataVaultKubernetesAuthBackendConfig extends cdktf.TerraformDataSource { @@ -86,7 +86,7 @@ export class DataVaultKubernetesAuthBackendConfig extends cdktf.TerraformDataSou * Generates CDKTF code for importing a DataVaultKubernetesAuthBackendConfig resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultKubernetesAuthBackendConfig to import - * @param importFromId The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultKubernetesAuthBackendConfig to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -98,7 +98,7 @@ export class DataVaultKubernetesAuthBackendConfig extends cdktf.TerraformDataSou // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -109,8 +109,8 @@ export class DataVaultKubernetesAuthBackendConfig extends cdktf.TerraformDataSou terraformResourceType: 'vault_kubernetes_auth_backend_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-kubernetes-auth-backend-role/README.md b/src/data-vault-kubernetes-auth-backend-role/README.md index a49acced..2651b854 100644 --- a/src/data-vault-kubernetes-auth-backend-role/README.md +++ b/src/data-vault-kubernetes-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `data_vault_kubernetes_auth_backend_role` -Refer to the Terraform Registry for docs: [`data_vault_kubernetes_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role). +Refer to the Terraform Registry for docs: [`data_vault_kubernetes_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role). diff --git a/src/data-vault-kubernetes-auth-backend-role/index.ts b/src/data-vault-kubernetes-auth-backend-role/index.ts index d3d228d4..56c3f98e 100644 --- a/src/data-vault-kubernetes-auth-backend-role/index.ts +++ b/src/data-vault-kubernetes-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface DataVaultKubernetesAuthBackendRoleConfig extends cdktf.Terrafor /** * Optional Audience claim to verify in the JWT. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} */ readonly audience?: string; /** * Unique name of the kubernetes backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,73 +34,73 @@ export interface DataVaultKubernetesAuthBackendRoleConfig extends cdktf.Terrafor /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} */ readonly roleName: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role} */ export class DataVaultKubernetesAuthBackendRole extends cdktf.TerraformDataSource { @@ -116,7 +116,7 @@ export class DataVaultKubernetesAuthBackendRole extends cdktf.TerraformDataSourc * Generates CDKTF code for importing a DataVaultKubernetesAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultKubernetesAuthBackendRole to import - * @param importFromId The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultKubernetesAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -128,7 +128,7 @@ export class DataVaultKubernetesAuthBackendRole extends cdktf.TerraformDataSourc // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -139,8 +139,8 @@ export class DataVaultKubernetesAuthBackendRole extends cdktf.TerraformDataSourc terraformResourceType: 'vault_kubernetes_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-kubernetes-service-account-token/README.md b/src/data-vault-kubernetes-service-account-token/README.md index 2184a3f7..b53ba96f 100644 --- a/src/data-vault-kubernetes-service-account-token/README.md +++ b/src/data-vault-kubernetes-service-account-token/README.md @@ -1,3 +1,3 @@ # `data_vault_kubernetes_service_account_token` -Refer to the Terraform Registry for docs: [`data_vault_kubernetes_service_account_token`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token). +Refer to the Terraform Registry for docs: [`data_vault_kubernetes_service_account_token`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token). diff --git a/src/data-vault-kubernetes-service-account-token/index.ts b/src/data-vault-kubernetes-service-account-token/index.ts index 455a9ff5..1122681b 100644 --- a/src/data-vault-kubernetes-service-account-token/index.ts +++ b/src/data-vault-kubernetes-service-account-token/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface DataVaultKubernetesServiceAccountTokenConfig extends cdktf.Terr /** * The Kubernetes secret backend to generate service account tokens from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} */ readonly backend: string; /** * If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} */ readonly clusterRoleBinding?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,31 +34,31 @@ export interface DataVaultKubernetesServiceAccountTokenConfig extends cdktf.Terr /** * The name of the Kubernetes namespace in which to generate the credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} */ readonly kubernetesNamespace: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} */ readonly namespace?: string; /** * The name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} */ readonly role: string; /** * The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} */ readonly ttl?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token} */ export class DataVaultKubernetesServiceAccountToken extends cdktf.TerraformDataSource { @@ -74,7 +74,7 @@ export class DataVaultKubernetesServiceAccountToken extends cdktf.TerraformDataS * Generates CDKTF code for importing a DataVaultKubernetesServiceAccountToken resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultKubernetesServiceAccountToken to import - * @param importFromId The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultKubernetesServiceAccountToken to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class DataVaultKubernetesServiceAccountToken extends cdktf.TerraformDataS // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class DataVaultKubernetesServiceAccountToken extends cdktf.TerraformDataS terraformResourceType: 'vault_kubernetes_service_account_token', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-kv-secret-subkeys-v2/README.md b/src/data-vault-kv-secret-subkeys-v2/README.md index 7d8026e3..0a67cfc6 100644 --- a/src/data-vault-kv-secret-subkeys-v2/README.md +++ b/src/data-vault-kv-secret-subkeys-v2/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secret_subkeys_v2` -Refer to the Terraform Registry for docs: [`data_vault_kv_secret_subkeys_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2). +Refer to the Terraform Registry for docs: [`data_vault_kv_secret_subkeys_v2`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2). diff --git a/src/data-vault-kv-secret-subkeys-v2/index.ts b/src/data-vault-kv-secret-subkeys-v2/index.ts index af68020a..22339c1c 100644 --- a/src/data-vault-kv-secret-subkeys-v2/index.ts +++ b/src/data-vault-kv-secret-subkeys-v2/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2 +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2 // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultKvSecretSubkeysV2Config extends cdktf.TerraformMetaArg /** * Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} */ readonly depth?: number; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,31 +28,31 @@ export interface DataVaultKvSecretSubkeysV2Config extends cdktf.TerraformMetaArg /** * Path where KV-V2 engine is mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} */ readonly mount: string; /** * Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} */ readonly namespace?: string; /** * Specifies the version to return. If not set the latest version is returned. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} */ readonly version?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2} */ export class DataVaultKvSecretSubkeysV2 extends cdktf.TerraformDataSource { @@ -68,7 +68,7 @@ export class DataVaultKvSecretSubkeysV2 extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultKvSecretSubkeysV2 resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 to import - * @param importFromId The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultKvSecretSubkeysV2 to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class DataVaultKvSecretSubkeysV2 extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class DataVaultKvSecretSubkeysV2 extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secret_subkeys_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-kv-secret-v2/README.md b/src/data-vault-kv-secret-v2/README.md index 88fcca3f..a565312c 100644 --- a/src/data-vault-kv-secret-v2/README.md +++ b/src/data-vault-kv-secret-v2/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secret_v2` -Refer to the Terraform Registry for docs: [`data_vault_kv_secret_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2). +Refer to the Terraform Registry for docs: [`data_vault_kv_secret_v2`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2). diff --git a/src/data-vault-kv-secret-v2/index.ts b/src/data-vault-kv-secret-v2/index.ts index 1040d811..2dbe43a4 100644 --- a/src/data-vault-kv-secret-v2/index.ts +++ b/src/data-vault-kv-secret-v2/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2 +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2 // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultKvSecretV2Config extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,31 +22,31 @@ export interface DataVaultKvSecretV2Config extends cdktf.TerraformMetaArguments /** * Path where KV-V2 engine is mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} */ readonly mount: string; /** * Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} */ readonly namespace?: string; /** * Version of the secret to retrieve * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} */ readonly version?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2} */ export class DataVaultKvSecretV2 extends cdktf.TerraformDataSource { @@ -62,7 +62,7 @@ export class DataVaultKvSecretV2 extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultKvSecretV2 resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultKvSecretV2 to import - * @param importFromId The id of the existing DataVaultKvSecretV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultKvSecretV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultKvSecretV2 to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class DataVaultKvSecretV2 extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class DataVaultKvSecretV2 extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secret_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-kv-secret/README.md b/src/data-vault-kv-secret/README.md index b11593f6..aff75874 100644 --- a/src/data-vault-kv-secret/README.md +++ b/src/data-vault-kv-secret/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secret` -Refer to the Terraform Registry for docs: [`data_vault_kv_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret). +Refer to the Terraform Registry for docs: [`data_vault_kv_secret`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret). diff --git a/src/data-vault-kv-secret/index.ts b/src/data-vault-kv-secret/index.ts index 04b24d12..387b4679 100644 --- a/src/data-vault-kv-secret/index.ts +++ b/src/data-vault-kv-secret/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultKvSecretConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,19 +22,19 @@ export interface DataVaultKvSecretConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} */ readonly namespace?: string; /** * Full path of the KV-V1 secret. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} */ readonly path: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret vault_kv_secret} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret vault_kv_secret} */ export class DataVaultKvSecret extends cdktf.TerraformDataSource { @@ -50,7 +50,7 @@ export class DataVaultKvSecret extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultKvSecret resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultKvSecret to import - * @param importFromId The id of the existing DataVaultKvSecret that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultKvSecret that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultKvSecret to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class DataVaultKvSecret extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secret vault_kv_secret} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secret vault_kv_secret} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class DataVaultKvSecret extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secret', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-kv-secrets-list-v2/README.md b/src/data-vault-kv-secrets-list-v2/README.md index f829f57c..c6cce020 100644 --- a/src/data-vault-kv-secrets-list-v2/README.md +++ b/src/data-vault-kv-secrets-list-v2/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secrets_list_v2` -Refer to the Terraform Registry for docs: [`data_vault_kv_secrets_list_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2). +Refer to the Terraform Registry for docs: [`data_vault_kv_secrets_list_v2`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2). diff --git a/src/data-vault-kv-secrets-list-v2/index.ts b/src/data-vault-kv-secrets-list-v2/index.ts index 9e02b86c..c926145a 100644 --- a/src/data-vault-kv-secrets-list-v2/index.ts +++ b/src/data-vault-kv-secrets-list-v2/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2 +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2 // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultKvSecretsListV2Config extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,25 +22,25 @@ export interface DataVaultKvSecretsListV2Config extends cdktf.TerraformMetaArgum /** * Path where KV-V2 engine is mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} */ readonly mount: string; /** * Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} */ readonly name?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2} */ export class DataVaultKvSecretsListV2 extends cdktf.TerraformDataSource { @@ -56,7 +56,7 @@ export class DataVaultKvSecretsListV2 extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultKvSecretsListV2 resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultKvSecretsListV2 to import - * @param importFromId The id of the existing DataVaultKvSecretsListV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultKvSecretsListV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultKvSecretsListV2 to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class DataVaultKvSecretsListV2 extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class DataVaultKvSecretsListV2 extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secrets_list_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-kv-secrets-list/README.md b/src/data-vault-kv-secrets-list/README.md index ea369600..bb6e663e 100644 --- a/src/data-vault-kv-secrets-list/README.md +++ b/src/data-vault-kv-secrets-list/README.md @@ -1,3 +1,3 @@ # `data_vault_kv_secrets_list` -Refer to the Terraform Registry for docs: [`data_vault_kv_secrets_list`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list). +Refer to the Terraform Registry for docs: [`data_vault_kv_secrets_list`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list). diff --git a/src/data-vault-kv-secrets-list/index.ts b/src/data-vault-kv-secrets-list/index.ts index da623f1d..31e4042b 100644 --- a/src/data-vault-kv-secrets-list/index.ts +++ b/src/data-vault-kv-secrets-list/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultKvSecretsListConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,19 +22,19 @@ export interface DataVaultKvSecretsListConfig extends cdktf.TerraformMetaArgumen /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} */ readonly namespace?: string; /** * Full KV-V1 path where secrets will be listed. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} */ readonly path: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list} */ export class DataVaultKvSecretsList extends cdktf.TerraformDataSource { @@ -50,7 +50,7 @@ export class DataVaultKvSecretsList extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultKvSecretsList resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultKvSecretsList to import - * @param importFromId The id of the existing DataVaultKvSecretsList that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultKvSecretsList that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultKvSecretsList to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class DataVaultKvSecretsList extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class DataVaultKvSecretsList extends cdktf.TerraformDataSource { terraformResourceType: 'vault_kv_secrets_list', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-ldap-dynamic-credentials/README.md b/src/data-vault-ldap-dynamic-credentials/README.md index 4c846de2..479345aa 100644 --- a/src/data-vault-ldap-dynamic-credentials/README.md +++ b/src/data-vault-ldap-dynamic-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_ldap_dynamic_credentials` -Refer to the Terraform Registry for docs: [`data_vault_ldap_dynamic_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials). +Refer to the Terraform Registry for docs: [`data_vault_ldap_dynamic_credentials`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials). diff --git a/src/data-vault-ldap-dynamic-credentials/index.ts b/src/data-vault-ldap-dynamic-credentials/index.ts index f0ac9ac5..80fe386f 100644 --- a/src/data-vault-ldap-dynamic-credentials/index.ts +++ b/src/data-vault-ldap-dynamic-credentials/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultLdapDynamicCredentialsConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,25 +22,25 @@ export interface DataVaultLdapDynamicCredentialsConfig extends cdktf.TerraformMe /** * LDAP Secret Backend to read credentials from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} */ readonly mount: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} */ readonly roleName: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials} */ export class DataVaultLdapDynamicCredentials extends cdktf.TerraformDataSource { @@ -56,7 +56,7 @@ export class DataVaultLdapDynamicCredentials extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultLdapDynamicCredentials resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultLdapDynamicCredentials to import - * @param importFromId The id of the existing DataVaultLdapDynamicCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultLdapDynamicCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultLdapDynamicCredentials to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class DataVaultLdapDynamicCredentials extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class DataVaultLdapDynamicCredentials extends cdktf.TerraformDataSource { terraformResourceType: 'vault_ldap_dynamic_credentials', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-ldap-static-credentials/README.md b/src/data-vault-ldap-static-credentials/README.md index ef0c7057..39a77726 100644 --- a/src/data-vault-ldap-static-credentials/README.md +++ b/src/data-vault-ldap-static-credentials/README.md @@ -1,3 +1,3 @@ # `data_vault_ldap_static_credentials` -Refer to the Terraform Registry for docs: [`data_vault_ldap_static_credentials`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials). +Refer to the Terraform Registry for docs: [`data_vault_ldap_static_credentials`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials). diff --git a/src/data-vault-ldap-static-credentials/index.ts b/src/data-vault-ldap-static-credentials/index.ts index e11ccc70..529589eb 100644 --- a/src/data-vault-ldap-static-credentials/index.ts +++ b/src/data-vault-ldap-static-credentials/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultLdapStaticCredentialsConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,25 +22,25 @@ export interface DataVaultLdapStaticCredentialsConfig extends cdktf.TerraformMet /** * LDAP Secret Backend to read credentials from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} */ readonly mount: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} */ readonly roleName: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials} */ export class DataVaultLdapStaticCredentials extends cdktf.TerraformDataSource { @@ -56,7 +56,7 @@ export class DataVaultLdapStaticCredentials extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultLdapStaticCredentials resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultLdapStaticCredentials to import - * @param importFromId The id of the existing DataVaultLdapStaticCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultLdapStaticCredentials that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultLdapStaticCredentials to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class DataVaultLdapStaticCredentials extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class DataVaultLdapStaticCredentials extends cdktf.TerraformDataSource { terraformResourceType: 'vault_ldap_static_credentials', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-nomad-access-token/README.md b/src/data-vault-nomad-access-token/README.md index 330bad65..ee95b4af 100644 --- a/src/data-vault-nomad-access-token/README.md +++ b/src/data-vault-nomad-access-token/README.md @@ -1,3 +1,3 @@ # `data_vault_nomad_access_token` -Refer to the Terraform Registry for docs: [`data_vault_nomad_access_token`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token). +Refer to the Terraform Registry for docs: [`data_vault_nomad_access_token`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token). diff --git a/src/data-vault-nomad-access-token/index.ts b/src/data-vault-nomad-access-token/index.ts index 7e7b1b12..53565bab 100644 --- a/src/data-vault-nomad-access-token/index.ts +++ b/src/data-vault-nomad-access-token/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultNomadAccessTokenConfig extends cdktf.TerraformMetaArgu /** * Nomad secret backend to generate tokens from. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface DataVaultNomadAccessTokenConfig extends cdktf.TerraformMetaArgu /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} */ readonly role: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token vault_nomad_access_token} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token vault_nomad_access_token} */ export class DataVaultNomadAccessToken extends cdktf.TerraformDataSource { @@ -56,7 +56,7 @@ export class DataVaultNomadAccessToken extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultNomadAccessToken resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultNomadAccessToken to import - * @param importFromId The id of the existing DataVaultNomadAccessToken that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultNomadAccessToken that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultNomadAccessToken to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class DataVaultNomadAccessToken extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/nomad_access_token vault_nomad_access_token} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/nomad_access_token vault_nomad_access_token} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class DataVaultNomadAccessToken extends cdktf.TerraformDataSource { terraformResourceType: 'vault_nomad_access_token', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-pki-secret-backend-issuer/README.md b/src/data-vault-pki-secret-backend-issuer/README.md index ecf70efd..0a522359 100644 --- a/src/data-vault-pki-secret-backend-issuer/README.md +++ b/src/data-vault-pki-secret-backend-issuer/README.md @@ -1,3 +1,3 @@ # `data_vault_pki_secret_backend_issuer` -Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_issuer`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer). +Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_issuer`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer). diff --git a/src/data-vault-pki-secret-backend-issuer/index.ts b/src/data-vault-pki-secret-backend-issuer/index.ts index f97df0ca..9f383cb2 100644 --- a/src/data-vault-pki-secret-backend-issuer/index.ts +++ b/src/data-vault-pki-secret-backend-issuer/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultPkiSecretBackendIssuerConfig extends cdktf.TerraformMe /** * Full path where PKI backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface DataVaultPkiSecretBackendIssuerConfig extends cdktf.TerraformMe /** * Reference to an existing issuer. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} */ readonly issuerRef: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer} */ export class DataVaultPkiSecretBackendIssuer extends cdktf.TerraformDataSource { @@ -56,7 +56,7 @@ export class DataVaultPkiSecretBackendIssuer extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultPkiSecretBackendIssuer resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultPkiSecretBackendIssuer to import - * @param importFromId The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultPkiSecretBackendIssuer to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class DataVaultPkiSecretBackendIssuer extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class DataVaultPkiSecretBackendIssuer extends cdktf.TerraformDataSource { terraformResourceType: 'vault_pki_secret_backend_issuer', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-pki-secret-backend-issuers/README.md b/src/data-vault-pki-secret-backend-issuers/README.md index 02444b89..c1c11fbe 100644 --- a/src/data-vault-pki-secret-backend-issuers/README.md +++ b/src/data-vault-pki-secret-backend-issuers/README.md @@ -1,3 +1,3 @@ # `data_vault_pki_secret_backend_issuers` -Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_issuers`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers). +Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_issuers`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers). diff --git a/src/data-vault-pki-secret-backend-issuers/index.ts b/src/data-vault-pki-secret-backend-issuers/index.ts index 228df24c..021e359b 100644 --- a/src/data-vault-pki-secret-backend-issuers/index.ts +++ b/src/data-vault-pki-secret-backend-issuers/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultPkiSecretBackendIssuersConfig extends cdktf.TerraformM /** * Full path where PKI backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,13 +28,13 @@ export interface DataVaultPkiSecretBackendIssuersConfig extends cdktf.TerraformM /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers} */ export class DataVaultPkiSecretBackendIssuers extends cdktf.TerraformDataSource { @@ -50,7 +50,7 @@ export class DataVaultPkiSecretBackendIssuers extends cdktf.TerraformDataSource * Generates CDKTF code for importing a DataVaultPkiSecretBackendIssuers resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultPkiSecretBackendIssuers to import - * @param importFromId The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultPkiSecretBackendIssuers to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class DataVaultPkiSecretBackendIssuers extends cdktf.TerraformDataSource // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class DataVaultPkiSecretBackendIssuers extends cdktf.TerraformDataSource terraformResourceType: 'vault_pki_secret_backend_issuers', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-pki-secret-backend-key/README.md b/src/data-vault-pki-secret-backend-key/README.md index 99ae2ce0..335dee9d 100644 --- a/src/data-vault-pki-secret-backend-key/README.md +++ b/src/data-vault-pki-secret-backend-key/README.md @@ -1,3 +1,3 @@ # `data_vault_pki_secret_backend_key` -Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key). +Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key). diff --git a/src/data-vault-pki-secret-backend-key/index.ts b/src/data-vault-pki-secret-backend-key/index.ts index 327f0c6a..199f83fa 100644 --- a/src/data-vault-pki-secret-backend-key/index.ts +++ b/src/data-vault-pki-secret-backend-key/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultPkiSecretBackendKeyConfig extends cdktf.TerraformMetaA /** * Full path where PKI backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface DataVaultPkiSecretBackendKeyConfig extends cdktf.TerraformMetaA /** * Reference to an existing key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} */ readonly keyRef: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key} */ export class DataVaultPkiSecretBackendKey extends cdktf.TerraformDataSource { @@ -56,7 +56,7 @@ export class DataVaultPkiSecretBackendKey extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultPkiSecretBackendKey resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultPkiSecretBackendKey to import - * @param importFromId The id of the existing DataVaultPkiSecretBackendKey that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultPkiSecretBackendKey that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultPkiSecretBackendKey to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class DataVaultPkiSecretBackendKey extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class DataVaultPkiSecretBackendKey extends cdktf.TerraformDataSource { terraformResourceType: 'vault_pki_secret_backend_key', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-pki-secret-backend-keys/README.md b/src/data-vault-pki-secret-backend-keys/README.md index 11e91f65..636f25d1 100644 --- a/src/data-vault-pki-secret-backend-keys/README.md +++ b/src/data-vault-pki-secret-backend-keys/README.md @@ -1,3 +1,3 @@ # `data_vault_pki_secret_backend_keys` -Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_keys`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys). +Refer to the Terraform Registry for docs: [`data_vault_pki_secret_backend_keys`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys). diff --git a/src/data-vault-pki-secret-backend-keys/index.ts b/src/data-vault-pki-secret-backend-keys/index.ts index ae871066..55a263b1 100644 --- a/src/data-vault-pki-secret-backend-keys/index.ts +++ b/src/data-vault-pki-secret-backend-keys/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface DataVaultPkiSecretBackendKeysConfig extends cdktf.TerraformMeta /** * Full path where PKI backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,13 +28,13 @@ export interface DataVaultPkiSecretBackendKeysConfig extends cdktf.TerraformMeta /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys} */ export class DataVaultPkiSecretBackendKeys extends cdktf.TerraformDataSource { @@ -50,7 +50,7 @@ export class DataVaultPkiSecretBackendKeys extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultPkiSecretBackendKeys resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultPkiSecretBackendKeys to import - * @param importFromId The id of the existing DataVaultPkiSecretBackendKeys that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultPkiSecretBackendKeys that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultPkiSecretBackendKeys to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class DataVaultPkiSecretBackendKeys extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class DataVaultPkiSecretBackendKeys extends cdktf.TerraformDataSource { terraformResourceType: 'vault_pki_secret_backend_keys', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-policy-document/README.md b/src/data-vault-policy-document/README.md index 72107e24..3015f16c 100644 --- a/src/data-vault-policy-document/README.md +++ b/src/data-vault-policy-document/README.md @@ -1,3 +1,3 @@ # `data_vault_policy_document` -Refer to the Terraform Registry for docs: [`data_vault_policy_document`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document). +Refer to the Terraform Registry for docs: [`data_vault_policy_document`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document). diff --git a/src/data-vault-policy-document/index.ts b/src/data-vault-policy-document/index.ts index 3c8a8bdc..71ce3523 100644 --- a/src/data-vault-policy-document/index.ts +++ b/src/data-vault-policy-document/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultPolicyDocumentConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,23 +22,23 @@ export interface DataVaultPolicyDocumentConfig extends cdktf.TerraformMetaArgume /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} */ readonly namespace?: string; /** * rule block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} */ readonly rule?: DataVaultPolicyDocumentRule[] | cdktf.IResolvable; } export interface DataVaultPolicyDocumentRuleAllowedParameter { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key} */ readonly key: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value} */ readonly value: string[]; } @@ -177,11 +177,11 @@ export class DataVaultPolicyDocumentRuleAllowedParameterList extends cdktf.Compl } export interface DataVaultPolicyDocumentRuleDeniedParameter { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key} */ readonly key: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value} */ readonly value: string[]; } @@ -320,39 +320,39 @@ export class DataVaultPolicyDocumentRuleDeniedParameterList extends cdktf.Comple } export interface DataVaultPolicyDocumentRule { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities} */ readonly capabilities: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description} */ readonly description?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl} */ readonly maxWrappingTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl} */ readonly minWrappingTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path} */ readonly path: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters} */ readonly requiredParameters?: string[]; /** * allowed_parameter block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} */ readonly allowedParameter?: DataVaultPolicyDocumentRuleAllowedParameter[] | cdktf.IResolvable; /** * denied_parameter block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} */ readonly deniedParameter?: DataVaultPolicyDocumentRuleDeniedParameter[] | cdktf.IResolvable; } @@ -665,7 +665,7 @@ export class DataVaultPolicyDocumentRuleList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document vault_policy_document} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document vault_policy_document} */ export class DataVaultPolicyDocument extends cdktf.TerraformDataSource { @@ -681,7 +681,7 @@ export class DataVaultPolicyDocument extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultPolicyDocument resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultPolicyDocument to import - * @param importFromId The id of the existing DataVaultPolicyDocument that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultPolicyDocument that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultPolicyDocument to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -693,7 +693,7 @@ export class DataVaultPolicyDocument extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/policy_document vault_policy_document} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/policy_document vault_policy_document} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -704,8 +704,8 @@ export class DataVaultPolicyDocument extends cdktf.TerraformDataSource { terraformResourceType: 'vault_policy_document', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-raft-autopilot-state/README.md b/src/data-vault-raft-autopilot-state/README.md index 04c4148b..c430df5a 100644 --- a/src/data-vault-raft-autopilot-state/README.md +++ b/src/data-vault-raft-autopilot-state/README.md @@ -1,3 +1,3 @@ # `data_vault_raft_autopilot_state` -Refer to the Terraform Registry for docs: [`data_vault_raft_autopilot_state`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state). +Refer to the Terraform Registry for docs: [`data_vault_raft_autopilot_state`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state). diff --git a/src/data-vault-raft-autopilot-state/index.ts b/src/data-vault-raft-autopilot-state/index.ts index 48719b9a..62690079 100644 --- a/src/data-vault-raft-autopilot-state/index.ts +++ b/src/data-vault-raft-autopilot-state/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface DataVaultRaftAutopilotStateConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,13 +22,13 @@ export interface DataVaultRaftAutopilotStateConfig extends cdktf.TerraformMetaAr /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state} */ export class DataVaultRaftAutopilotState extends cdktf.TerraformDataSource { @@ -44,7 +44,7 @@ export class DataVaultRaftAutopilotState extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultRaftAutopilotState resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultRaftAutopilotState to import - * @param importFromId The id of the existing DataVaultRaftAutopilotState that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultRaftAutopilotState that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultRaftAutopilotState to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -56,7 +56,7 @@ export class DataVaultRaftAutopilotState extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -67,8 +67,8 @@ export class DataVaultRaftAutopilotState extends cdktf.TerraformDataSource { terraformResourceType: 'vault_raft_autopilot_state', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-transform-decode/README.md b/src/data-vault-transform-decode/README.md index e0f1a8cf..34d6a7f5 100644 --- a/src/data-vault-transform-decode/README.md +++ b/src/data-vault-transform-decode/README.md @@ -1,3 +1,3 @@ # `data_vault_transform_decode` -Refer to the Terraform Registry for docs: [`data_vault_transform_decode`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode). +Refer to the Terraform Registry for docs: [`data_vault_transform_decode`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode). diff --git a/src/data-vault-transform-decode/index.ts b/src/data-vault-transform-decode/index.ts index cadd0cc3..315ba657 100644 --- a/src/data-vault-transform-decode/index.ts +++ b/src/data-vault-transform-decode/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface DataVaultTransformDecodeConfig extends cdktf.TerraformMetaArgum /** * Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} */ readonly batchInput?: { [key: string]: string }[] | cdktf.IResolvable; /** * The result of decoding batch_input. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} */ readonly batchResults?: { [key: string]: string }[] | cdktf.IResolvable; /** * The result of decoding a value. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} */ readonly decodedValue?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,43 +40,43 @@ export interface DataVaultTransformDecodeConfig extends cdktf.TerraformMetaArgum /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} */ readonly namespace?: string; /** * Path to backend from which to retrieve data. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} */ readonly path: string; /** * The name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} */ readonly roleName: string; /** * The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} */ readonly transformation?: string; /** * The tweak value to use. Only applicable for FPE transformations * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} */ readonly tweak?: string; /** * The value in which to decode. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} */ readonly value?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode vault_transform_decode} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode vault_transform_decode} */ export class DataVaultTransformDecode extends cdktf.TerraformDataSource { @@ -92,7 +92,7 @@ export class DataVaultTransformDecode extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultTransformDecode resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultTransformDecode to import - * @param importFromId The id of the existing DataVaultTransformDecode that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultTransformDecode that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultTransformDecode to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -104,7 +104,7 @@ export class DataVaultTransformDecode extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_decode vault_transform_decode} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_decode vault_transform_decode} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -115,8 +115,8 @@ export class DataVaultTransformDecode extends cdktf.TerraformDataSource { terraformResourceType: 'vault_transform_decode', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-transform-encode/README.md b/src/data-vault-transform-encode/README.md index f86e96d8..80040b2d 100644 --- a/src/data-vault-transform-encode/README.md +++ b/src/data-vault-transform-encode/README.md @@ -1,3 +1,3 @@ # `data_vault_transform_encode` -Refer to the Terraform Registry for docs: [`data_vault_transform_encode`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode). +Refer to the Terraform Registry for docs: [`data_vault_transform_encode`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode). diff --git a/src/data-vault-transform-encode/index.ts b/src/data-vault-transform-encode/index.ts index 78feaeae..1fca2aca 100644 --- a/src/data-vault-transform-encode/index.ts +++ b/src/data-vault-transform-encode/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface DataVaultTransformEncodeConfig extends cdktf.TerraformMetaArgum /** * Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} */ readonly batchInput?: { [key: string]: string }[] | cdktf.IResolvable; /** * The result of encoding batch_input. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} */ readonly batchResults?: { [key: string]: string }[] | cdktf.IResolvable; /** * The result of encoding a value. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} */ readonly encodedValue?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,43 +40,43 @@ export interface DataVaultTransformEncodeConfig extends cdktf.TerraformMetaArgum /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} */ readonly namespace?: string; /** * Path to backend from which to retrieve data. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} */ readonly path: string; /** * The name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} */ readonly roleName: string; /** * The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} */ readonly transformation?: string; /** * The tweak value to use. Only applicable for FPE transformations * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} */ readonly tweak?: string; /** * The value in which to encode. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} */ readonly value?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode vault_transform_encode} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode vault_transform_encode} */ export class DataVaultTransformEncode extends cdktf.TerraformDataSource { @@ -92,7 +92,7 @@ export class DataVaultTransformEncode extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultTransformEncode resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultTransformEncode to import - * @param importFromId The id of the existing DataVaultTransformEncode that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultTransformEncode that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultTransformEncode to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -104,7 +104,7 @@ export class DataVaultTransformEncode extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transform_encode vault_transform_encode} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transform_encode vault_transform_encode} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -115,8 +115,8 @@ export class DataVaultTransformEncode extends cdktf.TerraformDataSource { terraformResourceType: 'vault_transform_encode', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-transit-decrypt/README.md b/src/data-vault-transit-decrypt/README.md index 07e19aa2..fd7ce8a1 100644 --- a/src/data-vault-transit-decrypt/README.md +++ b/src/data-vault-transit-decrypt/README.md @@ -1,3 +1,3 @@ # `data_vault_transit_decrypt` -Refer to the Terraform Registry for docs: [`data_vault_transit_decrypt`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt). +Refer to the Terraform Registry for docs: [`data_vault_transit_decrypt`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt). diff --git a/src/data-vault-transit-decrypt/index.ts b/src/data-vault-transit-decrypt/index.ts index 09e628e6..e894e706 100644 --- a/src/data-vault-transit-decrypt/index.ts +++ b/src/data-vault-transit-decrypt/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface DataVaultTransitDecryptConfig extends cdktf.TerraformMetaArgume /** * The Transit secret backend the key belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} */ readonly backend: string; /** * Transit encrypted cipher text. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} */ readonly ciphertext: string; /** * Specifies the context for key derivation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} */ readonly context?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,19 +40,19 @@ export interface DataVaultTransitDecryptConfig extends cdktf.TerraformMetaArgume /** * Name of the decryption key to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} */ readonly key: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt vault_transit_decrypt} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt vault_transit_decrypt} */ export class DataVaultTransitDecrypt extends cdktf.TerraformDataSource { @@ -68,7 +68,7 @@ export class DataVaultTransitDecrypt extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultTransitDecrypt resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultTransitDecrypt to import - * @param importFromId The id of the existing DataVaultTransitDecrypt that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultTransitDecrypt that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultTransitDecrypt to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class DataVaultTransitDecrypt extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_decrypt vault_transit_decrypt} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_decrypt vault_transit_decrypt} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class DataVaultTransitDecrypt extends cdktf.TerraformDataSource { terraformResourceType: 'vault_transit_decrypt', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/data-vault-transit-encrypt/README.md b/src/data-vault-transit-encrypt/README.md index b9dd7e4e..386c4bd9 100644 --- a/src/data-vault-transit-encrypt/README.md +++ b/src/data-vault-transit-encrypt/README.md @@ -1,3 +1,3 @@ # `data_vault_transit_encrypt` -Refer to the Terraform Registry for docs: [`data_vault_transit_encrypt`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt). +Refer to the Terraform Registry for docs: [`data_vault_transit_encrypt`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt). diff --git a/src/data-vault-transit-encrypt/index.ts b/src/data-vault-transit-encrypt/index.ts index 69791ab8..281e413a 100644 --- a/src/data-vault-transit-encrypt/index.ts +++ b/src/data-vault-transit-encrypt/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface DataVaultTransitEncryptConfig extends cdktf.TerraformMetaArgume /** * The Transit secret backend the key belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} */ readonly backend: string; /** * Specifies the context for key derivation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} */ readonly context?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,31 +34,31 @@ export interface DataVaultTransitEncryptConfig extends cdktf.TerraformMetaArgume /** * Name of the encryption key to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} */ readonly key: string; /** * The version of the key to use for encryption * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} */ readonly keyVersion?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} */ readonly namespace?: string; /** * Map of strings read from Vault. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} */ readonly plaintext: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt vault_transit_encrypt} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt vault_transit_encrypt} */ export class DataVaultTransitEncrypt extends cdktf.TerraformDataSource { @@ -74,7 +74,7 @@ export class DataVaultTransitEncrypt extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataVaultTransitEncrypt resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataVaultTransitEncrypt to import - * @param importFromId The id of the existing DataVaultTransitEncrypt that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataVaultTransitEncrypt that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataVaultTransitEncrypt to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class DataVaultTransitEncrypt extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/data-sources/transit_encrypt vault_transit_encrypt} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/data-sources/transit_encrypt vault_transit_encrypt} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class DataVaultTransitEncrypt extends cdktf.TerraformDataSource { terraformResourceType: 'vault_transit_encrypt', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/database-secret-backend-connection/README.md b/src/database-secret-backend-connection/README.md index 9e113543..2302fed0 100644 --- a/src/database-secret-backend-connection/README.md +++ b/src/database-secret-backend-connection/README.md @@ -1,3 +1,3 @@ # `vault_database_secret_backend_connection` -Refer to the Terraform Registry for docs: [`vault_database_secret_backend_connection`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection). +Refer to the Terraform Registry for docs: [`vault_database_secret_backend_connection`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection). diff --git a/src/database-secret-backend-connection/index.ts b/src/database-secret-backend-connection/index.ts index c8474b9f..080b611f 100644 --- a/src/database-secret-backend-connection/index.ts +++ b/src/database-secret-backend-connection/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface DatabaseSecretBackendConnectionConfig extends cdktf.TerraformMe /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} */ readonly allowedRoles?: string[]; /** * Unique name of the Vault mount to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} */ readonly backend: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} */ readonly data?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,139 +40,139 @@ export interface DatabaseSecretBackendConnectionConfig extends cdktf.TerraformMe /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} */ readonly namespace?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; /** * cassandra block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} */ readonly cassandra?: DatabaseSecretBackendConnectionCassandra; /** * couchbase block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} */ readonly couchbase?: DatabaseSecretBackendConnectionCouchbase; /** * elasticsearch block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} */ readonly elasticsearch?: DatabaseSecretBackendConnectionElasticsearch; /** * hana block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} */ readonly hana?: DatabaseSecretBackendConnectionHana; /** * influxdb block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} */ readonly influxdb?: DatabaseSecretBackendConnectionInfluxdb; /** * mongodb block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} */ readonly mongodb?: DatabaseSecretBackendConnectionMongodb; /** * mongodbatlas block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} */ readonly mongodbatlas?: DatabaseSecretBackendConnectionMongodbatlas; /** * mssql block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} */ readonly mssql?: DatabaseSecretBackendConnectionMssql; /** * mysql block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} */ readonly mysql?: DatabaseSecretBackendConnectionMysql; /** * mysql_aurora block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} */ readonly mysqlAurora?: DatabaseSecretBackendConnectionMysqlAurora; /** * mysql_legacy block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} */ readonly mysqlLegacy?: DatabaseSecretBackendConnectionMysqlLegacy; /** * mysql_rds block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} */ readonly mysqlRds?: DatabaseSecretBackendConnectionMysqlRds; /** * oracle block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} */ readonly oracle?: DatabaseSecretBackendConnectionOracle; /** * postgresql block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} */ readonly postgresql?: DatabaseSecretBackendConnectionPostgresql; /** * redis block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} */ readonly redis?: DatabaseSecretBackendConnectionRedis; /** * redis_elasticache block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} */ readonly redisElasticache?: DatabaseSecretBackendConnectionRedisElasticache; /** * redshift block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} */ readonly redshift?: DatabaseSecretBackendConnectionRedshift; /** * snowflake block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} */ readonly snowflake?: DatabaseSecretBackendConnectionSnowflake; } @@ -180,61 +180,61 @@ export interface DatabaseSecretBackendConnectionCassandra { /** * The number of seconds to use as a connection timeout. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} */ readonly connectTimeout?: number; /** * Cassandra hosts to connect to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} */ readonly hosts?: string[]; /** * Whether to skip verification of the server certificate when using TLS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * The password to use when authenticating with Cassandra. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} */ readonly pemBundle?: string; /** * Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} */ readonly pemJson?: string; /** * The transport port to use to connect to Cassandra. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} */ readonly port?: number; /** * The CQL protocol version to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} */ readonly protocolVersion?: number; /** * Whether to use TLS when connecting to Cassandra. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} */ readonly tls?: boolean | cdktf.IResolvable; /** * The username to use when authenticating with Cassandra. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; } @@ -581,49 +581,49 @@ export interface DatabaseSecretBackendConnectionCouchbase { /** * Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} */ readonly base64Pem?: string; /** * Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} */ readonly bucketName?: string; /** * A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} */ readonly hosts: string[]; /** * Specifies whether to skip verification of the server certificate when using TLS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * Specifies the password corresponding to the given username. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password: string; /** * Specifies whether to use TLS when connecting to Couchbase. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} */ readonly tls?: boolean | cdktf.IResolvable; /** * Specifies the username for Vault to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username: string; /** * Template describing how dynamic usernames are generated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -903,61 +903,61 @@ export interface DatabaseSecretBackendConnectionElasticsearch { /** * The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} */ readonly caCert?: string; /** * The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} */ readonly caPath?: string; /** * The path to the certificate for the Elasticsearch client to present for communication * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} */ readonly clientCert?: string; /** * The path to the key for the Elasticsearch client to use for communication * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} */ readonly clientKey?: string; /** * Whether to disable certificate verification * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} */ readonly insecure?: boolean | cdktf.IResolvable; /** * The password to be used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password: string; /** * This, if set, is used to set the SNI host when connecting via TLS * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} */ readonly tlsServerName?: string; /** * The URL for Elasticsearch's API * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} */ readonly url: string; /** * The username to be used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username: string; /** * Template describing how dynamic usernames are generated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -1295,43 +1295,43 @@ export interface DatabaseSecretBackendConnectionHana { /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Disable special character escaping in username and password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} */ readonly disableEscaping?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; } @@ -1591,61 +1591,61 @@ export interface DatabaseSecretBackendConnectionInfluxdb { /** * The number of seconds to use as a connection timeout. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} */ readonly connectTimeout?: number; /** * Influxdb host to connect to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} */ readonly host: string; /** * Whether to skip verification of the server certificate when using TLS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * Specifies the password corresponding to the given username. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password: string; /** * Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} */ readonly pemBundle?: string; /** * Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} */ readonly pemJson?: string; /** * The transport port to use to connect to Influxdb. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} */ readonly port?: number; /** * Whether to use TLS when connecting to Influxdb. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} */ readonly tls?: boolean | cdktf.IResolvable; /** * Specifies the username to use for superuser access. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username: string; /** * Template describing how dynamic usernames are generated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -1983,43 +1983,43 @@ export interface DatabaseSecretBackendConnectionMongodb { /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -2279,19 +2279,19 @@ export interface DatabaseSecretBackendConnectionMongodbatlas { /** * The Private Programmatic API Key used to connect with MongoDB Atlas API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} */ readonly privateKey: string; /** * The Project ID the Database User should be created within. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} */ readonly projectId: string; /** * The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} */ readonly publicKey: string; } @@ -2426,55 +2426,55 @@ export interface DatabaseSecretBackendConnectionMssql { /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Set to true when the target is a Contained Database, e.g. AzureSQL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} */ readonly containedDb?: boolean | cdktf.IResolvable; /** * Disable special character escaping in username and password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} */ readonly disableEscaping?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -2792,67 +2792,67 @@ export interface DatabaseSecretBackendConnectionMysql { /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} */ readonly serviceAccountJson?: string; /** * x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} */ readonly tlsCa?: string; /** * x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} */ readonly tlsCertificateKey?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -3228,67 +3228,67 @@ export interface DatabaseSecretBackendConnectionMysqlAurora { /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} */ readonly serviceAccountJson?: string; /** * x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} */ readonly tlsCa?: string; /** * x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} */ readonly tlsCertificateKey?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -3664,67 +3664,67 @@ export interface DatabaseSecretBackendConnectionMysqlLegacy { /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} */ readonly serviceAccountJson?: string; /** * x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} */ readonly tlsCa?: string; /** * x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} */ readonly tlsCertificateKey?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -4100,67 +4100,67 @@ export interface DatabaseSecretBackendConnectionMysqlRds { /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} */ readonly serviceAccountJson?: string; /** * x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} */ readonly tlsCa?: string; /** * x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} */ readonly tlsCertificateKey?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -4536,55 +4536,55 @@ export interface DatabaseSecretBackendConnectionOracle { /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Set to true to disconnect any open sessions prior to running the revocation statements. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} */ readonly disconnectSessions?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * Set to true in order to split statements after semi-colons. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} */ readonly splitStatements?: boolean | cdktf.IResolvable; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -4902,61 +4902,61 @@ export interface DatabaseSecretBackendConnectionPostgresql { /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Disable special character escaping in username and password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} */ readonly disableEscaping?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} */ readonly serviceAccountJson?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -5303,43 +5303,43 @@ export interface DatabaseSecretBackendConnectionRedis { /** * The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} */ readonly caCert?: string; /** * Specifies the host to connect to * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} */ readonly host: string; /** * Specifies whether to skip verification of the server certificate when using TLS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * Specifies the password corresponding to the given username. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password: string; /** * The transport port to use to connect to Redis. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} */ readonly port?: number; /** * Specifies whether to use TLS when connecting to Redis. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} */ readonly tls?: boolean | cdktf.IResolvable; /** * Specifies the username for Vault to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username: string; } @@ -5590,25 +5590,25 @@ export interface DatabaseSecretBackendConnectionRedisElasticache { /** * The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} */ readonly region?: string; /** * The configuration endpoint for the ElastiCache cluster to connect to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} */ readonly url: string; /** * The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; } @@ -5778,49 +5778,49 @@ export interface DatabaseSecretBackendConnectionRedshift { /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Disable special character escaping in username and password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} */ readonly disableEscaping?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -6109,43 +6109,43 @@ export interface DatabaseSecretBackendConnectionSnowflake { /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} */ readonly connectionUrl?: string; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} */ readonly maxOpenConnections?: number; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} */ readonly password?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} */ readonly usernameTemplate?: string; } @@ -6403,7 +6403,7 @@ export class DatabaseSecretBackendConnectionSnowflakeOutputReference extends cdk } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection} */ export class DatabaseSecretBackendConnection extends cdktf.TerraformResource { @@ -6419,7 +6419,7 @@ export class DatabaseSecretBackendConnection extends cdktf.TerraformResource { * Generates CDKTF code for importing a DatabaseSecretBackendConnection resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DatabaseSecretBackendConnection to import - * @param importFromId The id of the existing DatabaseSecretBackendConnection that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DatabaseSecretBackendConnection that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DatabaseSecretBackendConnection to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -6431,7 +6431,7 @@ export class DatabaseSecretBackendConnection extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -6442,8 +6442,8 @@ export class DatabaseSecretBackendConnection extends cdktf.TerraformResource { terraformResourceType: 'vault_database_secret_backend_connection', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/database-secret-backend-role/README.md b/src/database-secret-backend-role/README.md index 5091c65a..4f0bf5b3 100644 --- a/src/database-secret-backend-role/README.md +++ b/src/database-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_database_secret_backend_role` -Refer to the Terraform Registry for docs: [`vault_database_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_database_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role). diff --git a/src/database-secret-backend-role/index.ts b/src/database-secret-backend-role/index.ts index afbba0cb..8c37a17e 100644 --- a/src/database-secret-backend-role/index.ts +++ b/src/database-secret-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,41 +15,41 @@ export interface DatabaseSecretBackendRoleConfig extends cdktf.TerraformMetaArgu /** * The path of the Database Secret Backend the role belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} */ readonly backend: string; /** * Database statements to execute to create and configure a user. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} */ readonly creationStatements: string[]; /** * Specifies the configuration for the given credential_type. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} */ readonly credentialConfig?: { [key: string]: string }; /** * Specifies the type of credential that will be generated for the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} */ readonly credentialType?: string; /** * Database connection to use for this role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} */ readonly dbName: string; /** * Default TTL for leases associated with this role, in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} */ readonly defaultTtl?: number; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -58,43 +58,43 @@ export interface DatabaseSecretBackendRoleConfig extends cdktf.TerraformMetaArgu /** * Maximum TTL for leases associated with this role, in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} */ readonly maxTtl?: number; /** * Unique name for the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} */ readonly namespace?: string; /** * Database statements to execute to renew a user. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} */ readonly renewStatements?: string[]; /** * Database statements to execute to revoke a user. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} */ readonly revocationStatements?: string[]; /** * Database statements to execute to rollback a create operation in the event of an error. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} */ readonly rollbackStatements?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role} */ export class DatabaseSecretBackendRole extends cdktf.TerraformResource { @@ -110,7 +110,7 @@ export class DatabaseSecretBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a DatabaseSecretBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DatabaseSecretBackendRole to import - * @param importFromId The id of the existing DatabaseSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DatabaseSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DatabaseSecretBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -122,7 +122,7 @@ export class DatabaseSecretBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -133,8 +133,8 @@ export class DatabaseSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_database_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/database-secret-backend-static-role/README.md b/src/database-secret-backend-static-role/README.md index 25d492b9..18c97d6e 100644 --- a/src/database-secret-backend-static-role/README.md +++ b/src/database-secret-backend-static-role/README.md @@ -1,3 +1,3 @@ # `vault_database_secret_backend_static_role` -Refer to the Terraform Registry for docs: [`vault_database_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role). +Refer to the Terraform Registry for docs: [`vault_database_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role). diff --git a/src/database-secret-backend-static-role/index.ts b/src/database-secret-backend-static-role/index.ts index 0146a597..54a8ff41 100644 --- a/src/database-secret-backend-static-role/index.ts +++ b/src/database-secret-backend-static-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface DatabaseSecretBackendStaticRoleConfig extends cdktf.TerraformMe /** * The path of the Database Secret Backend the role belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} */ readonly backend: string; /** * Database connection to use for this role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} */ readonly dbName: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,49 +34,49 @@ export interface DatabaseSecretBackendStaticRoleConfig extends cdktf.TerraformMe /** * Unique name for the static role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} */ readonly namespace?: string; /** * The amount of time Vault should wait before rotating the password, in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} */ readonly rotationPeriod?: number; /** * A cron-style string that will define the schedule on which rotations should occur. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} */ readonly rotationSchedule?: string; /** * Database statements to execute to rotate the password for the configured database user. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} */ readonly rotationStatements?: string[]; /** * The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} */ readonly rotationWindow?: number; /** * The database username that this role corresponds to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} */ readonly username: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role} */ export class DatabaseSecretBackendStaticRole extends cdktf.TerraformResource { @@ -92,7 +92,7 @@ export class DatabaseSecretBackendStaticRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a DatabaseSecretBackendStaticRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DatabaseSecretBackendStaticRole to import - * @param importFromId The id of the existing DatabaseSecretBackendStaticRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DatabaseSecretBackendStaticRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DatabaseSecretBackendStaticRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -104,7 +104,7 @@ export class DatabaseSecretBackendStaticRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -115,8 +115,8 @@ export class DatabaseSecretBackendStaticRole extends cdktf.TerraformResource { terraformResourceType: 'vault_database_secret_backend_static_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/database-secrets-mount/README.md b/src/database-secrets-mount/README.md index 1313b890..9ae750e2 100644 --- a/src/database-secrets-mount/README.md +++ b/src/database-secrets-mount/README.md @@ -1,3 +1,3 @@ # `vault_database_secrets_mount` -Refer to the Terraform Registry for docs: [`vault_database_secrets_mount`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount). +Refer to the Terraform Registry for docs: [`vault_database_secrets_mount`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount). diff --git a/src/database-secrets-mount/index.ts b/src/database-secrets-mount/index.ts index 3270fe2f..67875f13 100644 --- a/src/database-secrets-mount/index.ts +++ b/src/database-secrets-mount/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,41 +15,41 @@ export interface DatabaseSecretsMountConfig extends cdktf.TerraformMetaArguments /** * List of managed key registry entry names that the mount in question is allowed to access * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} */ readonly allowedManagedKeys?: string[]; /** * Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} */ readonly auditNonHmacRequestKeys?: string[]; /** * Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} */ readonly auditNonHmacResponseKeys?: string[]; /** * Default lease duration for tokens and secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} */ readonly description?: string; /** * Enable the secrets engine to access Vault's external entropy source * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} */ readonly externalEntropyAccess?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -58,145 +58,145 @@ export interface DatabaseSecretsMountConfig extends cdktf.TerraformMetaArguments /** * Local mount flag that can be explicitly set to true to enforce local mount in HA environment * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum possible lease duration for tokens and secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} */ readonly namespace?: string; /** * Specifies mount type specific options that are passed to the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} */ readonly options?: { [key: string]: string }; /** * Where the secret backend will be mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} */ readonly path: string; /** * Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} */ readonly sealWrap?: boolean | cdktf.IResolvable; /** * cassandra block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} */ readonly cassandra?: DatabaseSecretsMountCassandra[] | cdktf.IResolvable; /** * couchbase block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} */ readonly couchbase?: DatabaseSecretsMountCouchbase[] | cdktf.IResolvable; /** * elasticsearch block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} */ readonly elasticsearch?: DatabaseSecretsMountElasticsearch[] | cdktf.IResolvable; /** * hana block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} */ readonly hana?: DatabaseSecretsMountHana[] | cdktf.IResolvable; /** * influxdb block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} */ readonly influxdb?: DatabaseSecretsMountInfluxdb[] | cdktf.IResolvable; /** * mongodb block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} */ readonly mongodb?: DatabaseSecretsMountMongodb[] | cdktf.IResolvable; /** * mongodbatlas block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} */ readonly mongodbatlas?: DatabaseSecretsMountMongodbatlas[] | cdktf.IResolvable; /** * mssql block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} */ readonly mssql?: DatabaseSecretsMountMssql[] | cdktf.IResolvable; /** * mysql block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} */ readonly mysql?: DatabaseSecretsMountMysql[] | cdktf.IResolvable; /** * mysql_aurora block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} */ readonly mysqlAurora?: DatabaseSecretsMountMysqlAurora[] | cdktf.IResolvable; /** * mysql_legacy block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} */ readonly mysqlLegacy?: DatabaseSecretsMountMysqlLegacy[] | cdktf.IResolvable; /** * mysql_rds block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} */ readonly mysqlRds?: DatabaseSecretsMountMysqlRds[] | cdktf.IResolvable; /** * oracle block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} */ readonly oracle?: DatabaseSecretsMountOracle[] | cdktf.IResolvable; /** * postgresql block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} */ readonly postgresql?: DatabaseSecretsMountPostgresql[] | cdktf.IResolvable; /** * redis block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} */ readonly redis?: DatabaseSecretsMountRedis[] | cdktf.IResolvable; /** * redis_elasticache block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} */ readonly redisElasticache?: DatabaseSecretsMountRedisElasticache[] | cdktf.IResolvable; /** * redshift block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} */ readonly redshift?: DatabaseSecretsMountRedshift[] | cdktf.IResolvable; /** * snowflake block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} */ readonly snowflake?: DatabaseSecretsMountSnowflake[] | cdktf.IResolvable; } @@ -204,97 +204,97 @@ export interface DatabaseSecretsMountCassandra { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * The number of seconds to use as a connection timeout. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} */ readonly connectTimeout?: number; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Cassandra hosts to connect to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} */ readonly hosts?: string[]; /** * Whether to skip verification of the server certificate when using TLS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The password to use when authenticating with Cassandra. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} */ readonly pemBundle?: string; /** * Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} */ readonly pemJson?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * The transport port to use to connect to Cassandra. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} */ readonly port?: number; /** * The CQL protocol version to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} */ readonly protocolVersion?: number; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * Whether to use TLS when connecting to Cassandra. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} */ readonly tls?: boolean | cdktf.IResolvable; /** * The username to use when authenticating with Cassandra. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -844,85 +844,85 @@ export interface DatabaseSecretsMountCouchbase { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} */ readonly base64Pem?: string; /** * Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} */ readonly bucketName?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} */ readonly hosts: string[]; /** * Specifies whether to skip verification of the server certificate when using TLS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * Specifies the password corresponding to the given username. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * Specifies whether to use TLS when connecting to Couchbase. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} */ readonly tls?: boolean | cdktf.IResolvable; /** * Specifies the username for Vault to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username: string; /** * Template describing how dynamic usernames are generated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -1405,97 +1405,97 @@ export interface DatabaseSecretsMountElasticsearch { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} */ readonly caCert?: string; /** * The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} */ readonly caPath?: string; /** * The path to the certificate for the Elasticsearch client to present for communication * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} */ readonly clientCert?: string; /** * The path to the key for the Elasticsearch client to use for communication * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} */ readonly clientKey?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Whether to disable certificate verification * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} */ readonly insecure?: boolean | cdktf.IResolvable; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The password to be used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * This, if set, is used to set the SNI host when connecting via TLS * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} */ readonly tlsServerName?: string; /** * The URL for Elasticsearch's API * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} */ readonly url: string; /** * The username to be used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username: string; /** * Template describing how dynamic usernames are generated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -2036,79 +2036,79 @@ export interface DatabaseSecretsMountHana { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Disable special character escaping in username and password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} */ readonly disableEscaping?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -2571,97 +2571,97 @@ export interface DatabaseSecretsMountInfluxdb { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * The number of seconds to use as a connection timeout. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} */ readonly connectTimeout?: number; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Influxdb host to connect to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} */ readonly host: string; /** * Whether to skip verification of the server certificate when using TLS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * Specifies the password corresponding to the given username. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password: string; /** * Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} */ readonly pemBundle?: string; /** * Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} */ readonly pemJson?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * The transport port to use to connect to Influxdb. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} */ readonly port?: number; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * Whether to use TLS when connecting to Influxdb. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} */ readonly tls?: boolean | cdktf.IResolvable; /** * Specifies the username to use for superuser access. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username: string; /** * Template describing how dynamic usernames are generated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -3202,79 +3202,79 @@ export interface DatabaseSecretsMountMongodb { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -3737,55 +3737,55 @@ export interface DatabaseSecretsMountMongodbatlas { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * The Private Programmatic API Key used to connect with MongoDB Atlas API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} */ readonly privateKey: string; /** * The Project ID the Database User should be created within. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} */ readonly projectId: string; /** * The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} */ readonly publicKey: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -4123,91 +4123,91 @@ export interface DatabaseSecretsMountMssql { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * Set to true when the target is a Contained Database, e.g. AzureSQL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} */ readonly containedDb?: boolean | cdktf.IResolvable; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Disable special character escaping in username and password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} */ readonly disableEscaping?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -4728,103 +4728,103 @@ export interface DatabaseSecretsMountMysql { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} */ readonly serviceAccountJson?: string; /** * x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} */ readonly tlsCa?: string; /** * x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} */ readonly tlsCertificateKey?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -5403,103 +5403,103 @@ export interface DatabaseSecretsMountMysqlAurora { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} */ readonly serviceAccountJson?: string; /** * x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} */ readonly tlsCa?: string; /** * x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} */ readonly tlsCertificateKey?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -6078,103 +6078,103 @@ export interface DatabaseSecretsMountMysqlLegacy { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} */ readonly serviceAccountJson?: string; /** * x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} */ readonly tlsCa?: string; /** * x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} */ readonly tlsCertificateKey?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -6753,103 +6753,103 @@ export interface DatabaseSecretsMountMysqlRds { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} */ readonly serviceAccountJson?: string; /** * x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} */ readonly tlsCa?: string; /** * x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} */ readonly tlsCertificateKey?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -7428,91 +7428,91 @@ export interface DatabaseSecretsMountOracle { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Set to true to disconnect any open sessions prior to running the revocation statements. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} */ readonly disconnectSessions?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * Set to true in order to split statements after semi-colons. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} */ readonly splitStatements?: boolean | cdktf.IResolvable; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -8033,97 +8033,97 @@ export interface DatabaseSecretsMountPostgresql { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Specify alternative authorization type. (Only 'gcp_iam' is valid currently) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} */ readonly authType?: string; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Disable special character escaping in username and password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} */ readonly disableEscaping?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * A JSON encoded credential for use with IAM authorization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} */ readonly serviceAccountJson?: string; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -8673,79 +8673,79 @@ export interface DatabaseSecretsMountRedis { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} */ readonly caCert?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Specifies the host to connect to * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} */ readonly host: string; /** * Specifies whether to skip verification of the server certificate when using TLS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * Specifies the password corresponding to the given username. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * The transport port to use to connect to Redis. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} */ readonly port?: number; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * Specifies whether to use TLS when connecting to Redis. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} */ readonly tls?: boolean | cdktf.IResolvable; /** * Specifies the username for Vault to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -9199,61 +9199,61 @@ export interface DatabaseSecretsMountRedisElasticache { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} */ readonly region?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * The configuration endpoint for the ElastiCache cluster to connect to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} */ readonly url: string; /** * The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -9626,85 +9626,85 @@ export interface DatabaseSecretsMountRedshift { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Disable special character escaping in username and password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} */ readonly disableEscaping?: boolean | cdktf.IResolvable; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -10196,79 +10196,79 @@ export interface DatabaseSecretsMountSnowflake { /** * A list of roles that are allowed to use this connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} */ readonly allowedRoles?: string[]; /** * Connection string to use to connect to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} */ readonly connectionUrl?: string; /** * A map of sensitive data to pass to the endpoint. Useful for templated connection strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} */ readonly data?: { [key: string]: string }; /** * Maximum number of seconds a connection may be reused. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} */ readonly maxConnectionLifetime?: number; /** * Maximum number of idle connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} */ readonly maxIdleConnections?: number; /** * Maximum number of open connections to the database. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} */ readonly maxOpenConnections?: number; /** * Name of the database connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} */ readonly name: string; /** * The root credential password used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} */ readonly password?: string; /** * Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} */ readonly pluginName?: string; /** * A list of database statements to be executed to rotate the root user's credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} */ readonly rootRotationStatements?: string[]; /** * The root credential username used in the connection URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} */ readonly username?: string; /** * Username generation template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} */ readonly usernameTemplate?: string; /** * Specifies if the connection is verified during initial configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } @@ -10729,7 +10729,7 @@ export class DatabaseSecretsMountSnowflakeList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount vault_database_secrets_mount} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount vault_database_secrets_mount} */ export class DatabaseSecretsMount extends cdktf.TerraformResource { @@ -10745,7 +10745,7 @@ export class DatabaseSecretsMount extends cdktf.TerraformResource { * Generates CDKTF code for importing a DatabaseSecretsMount resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DatabaseSecretsMount to import - * @param importFromId The id of the existing DatabaseSecretsMount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DatabaseSecretsMount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DatabaseSecretsMount to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -10757,7 +10757,7 @@ export class DatabaseSecretsMount extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/database_secrets_mount vault_database_secrets_mount} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/database_secrets_mount vault_database_secrets_mount} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -10768,8 +10768,8 @@ export class DatabaseSecretsMount extends cdktf.TerraformResource { terraformResourceType: 'vault_database_secrets_mount', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/egp-policy/README.md b/src/egp-policy/README.md index 9c9d7ba7..63257a38 100644 --- a/src/egp-policy/README.md +++ b/src/egp-policy/README.md @@ -1,3 +1,3 @@ # `vault_egp_policy` -Refer to the Terraform Registry for docs: [`vault_egp_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy). +Refer to the Terraform Registry for docs: [`vault_egp_policy`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy). diff --git a/src/egp-policy/index.ts b/src/egp-policy/index.ts index b665f0d9..722ca2a8 100644 --- a/src/egp-policy/index.ts +++ b/src/egp-policy/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface EgpPolicyConfig extends cdktf.TerraformMetaArguments { /** * Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} */ readonly enforcementLevel: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#id EgpPolicy#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#id EgpPolicy#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,31 +28,31 @@ export interface EgpPolicyConfig extends cdktf.TerraformMetaArguments { /** * Name of the policy * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#name EgpPolicy#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#name EgpPolicy#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} */ readonly namespace?: string; /** * List of paths to which the policy will be applied * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#paths EgpPolicy#paths} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#paths EgpPolicy#paths} */ readonly paths: string[]; /** * The policy document * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#policy EgpPolicy#policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#policy EgpPolicy#policy} */ readonly policy: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy vault_egp_policy} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy vault_egp_policy} */ export class EgpPolicy extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class EgpPolicy extends cdktf.TerraformResource { * Generates CDKTF code for importing a EgpPolicy resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the EgpPolicy to import - * @param importFromId The id of the existing EgpPolicy that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing EgpPolicy that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the EgpPolicy to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class EgpPolicy extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/egp_policy vault_egp_policy} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/egp_policy vault_egp_policy} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class EgpPolicy extends cdktf.TerraformResource { terraformResourceType: 'vault_egp_policy', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/gcp-auth-backend-role/README.md b/src/gcp-auth-backend-role/README.md index 295ea581..a72309c0 100644 --- a/src/gcp-auth-backend-role/README.md +++ b/src/gcp-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_gcp_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_gcp_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_gcp_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role). diff --git a/src/gcp-auth-backend-role/index.ts b/src/gcp-auth-backend-role/index.ts index c9fc0889..ad13ec92 100644 --- a/src/gcp-auth-backend-role/index.ts +++ b/src/gcp-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,124 +13,124 @@ import * as cdktf from 'cdktf'; export interface GcpAuthBackendRoleConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases} */ readonly addGroupAliases?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference} */ readonly allowGceInference?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups} */ readonly boundInstanceGroups?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels} */ readonly boundLabels?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects} */ readonly boundProjects?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions} */ readonly boundRegions?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts} */ readonly boundServiceAccounts?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones} */ readonly boundZones?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. */ readonly id?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp} */ readonly maxJwtExp?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} */ readonly namespace?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role} */ readonly role: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} */ readonly tokenType?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type} */ readonly type: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role} */ export class GcpAuthBackendRole extends cdktf.TerraformResource { @@ -146,7 +146,7 @@ export class GcpAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a GcpAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GcpAuthBackendRole to import - * @param importFromId The id of the existing GcpAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GcpAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GcpAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -158,7 +158,7 @@ export class GcpAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -169,8 +169,8 @@ export class GcpAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/gcp-auth-backend/README.md b/src/gcp-auth-backend/README.md index 1f059d82..41b55591 100644 --- a/src/gcp-auth-backend/README.md +++ b/src/gcp-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_gcp_auth_backend` -Refer to the Terraform Registry for docs: [`vault_gcp_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend). +Refer to the Terraform Registry for docs: [`vault_gcp_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend). diff --git a/src/gcp-auth-backend/index.ts b/src/gcp-auth-backend/index.ts index 33a9b770..292778cf 100644 --- a/src/gcp-auth-backend/index.ts +++ b/src/gcp-auth-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,29 +13,29 @@ import * as cdktf from 'cdktf'; export interface GcpAuthBackendConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email} */ readonly clientEmail?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id} */ readonly clientId?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials} */ readonly credentials?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -44,69 +44,69 @@ export interface GcpAuthBackendConfig extends cdktf.TerraformMetaArguments { /** * Specifies if the auth method is local only * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} */ readonly namespace?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path} */ readonly path?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id} */ readonly privateKeyId?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id} */ readonly projectId?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune} */ readonly tune?: GcpAuthBackendTune[] | cdktf.IResolvable; /** * custom_endpoint block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} */ readonly customEndpoint?: GcpAuthBackendCustomEndpoint; } export interface GcpAuthBackendTune { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers} */ readonly allowedResponseHeaders?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys} */ readonly auditNonHmacRequestKeys?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys} */ readonly auditNonHmacResponseKeys?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl} */ readonly defaultLeaseTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility} */ readonly listingVisibility?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl} */ readonly maxLeaseTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers} */ readonly passthroughRequestHeaders?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type} */ readonly tokenType?: string; } @@ -427,25 +427,25 @@ export interface GcpAuthBackendCustomEndpoint { /** * Replaces the service endpoint used in API requests to https://www.googleapis.com. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} */ readonly api?: string; /** * Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} */ readonly compute?: string; /** * Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} */ readonly crm?: string; /** * Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} */ readonly iam?: string; } @@ -616,7 +616,7 @@ export class GcpAuthBackendCustomEndpointOutputReference extends cdktf.ComplexOb } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend} */ export class GcpAuthBackend extends cdktf.TerraformResource { @@ -632,7 +632,7 @@ export class GcpAuthBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a GcpAuthBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GcpAuthBackend to import - * @param importFromId The id of the existing GcpAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GcpAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GcpAuthBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -644,7 +644,7 @@ export class GcpAuthBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -655,8 +655,8 @@ export class GcpAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/gcp-secret-backend/README.md b/src/gcp-secret-backend/README.md index b151ec13..7566188d 100644 --- a/src/gcp-secret-backend/README.md +++ b/src/gcp-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_gcp_secret_backend` -Refer to the Terraform Registry for docs: [`vault_gcp_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend). +Refer to the Terraform Registry for docs: [`vault_gcp_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend). diff --git a/src/gcp-secret-backend/index.ts b/src/gcp-secret-backend/index.ts index 85ed3bec..9aa4858d 100644 --- a/src/gcp-secret-backend/index.ts +++ b/src/gcp-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,29 +15,29 @@ export interface GcpSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * JSON-encoded credentials to use to connect to GCP * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} */ readonly credentials?: string; /** * Default lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -46,31 +46,31 @@ export interface GcpSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * Local mount flag that can be explicitly set to true to enforce local mount in HA environment * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum possible lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} */ readonly namespace?: string; /** * Path to mount the backend at. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} */ readonly path?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend} */ export class GcpSecretBackend extends cdktf.TerraformResource { @@ -86,7 +86,7 @@ export class GcpSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a GcpSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GcpSecretBackend to import - * @param importFromId The id of the existing GcpSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GcpSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GcpSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -98,7 +98,7 @@ export class GcpSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -109,8 +109,8 @@ export class GcpSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/gcp-secret-impersonated-account/README.md b/src/gcp-secret-impersonated-account/README.md index 49b0310c..a72b12ed 100644 --- a/src/gcp-secret-impersonated-account/README.md +++ b/src/gcp-secret-impersonated-account/README.md @@ -1,3 +1,3 @@ # `vault_gcp_secret_impersonated_account` -Refer to the Terraform Registry for docs: [`vault_gcp_secret_impersonated_account`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account). +Refer to the Terraform Registry for docs: [`vault_gcp_secret_impersonated_account`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account). diff --git a/src/gcp-secret-impersonated-account/index.ts b/src/gcp-secret-impersonated-account/index.ts index 63b8c967..4bc00ce8 100644 --- a/src/gcp-secret-impersonated-account/index.ts +++ b/src/gcp-secret-impersonated-account/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface GcpSecretImpersonatedAccountConfig extends cdktf.TerraformMetaA /** * Path where the GCP secrets engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,31 +28,31 @@ export interface GcpSecretImpersonatedAccountConfig extends cdktf.TerraformMetaA /** * Name of the Impersonated Account to create * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} */ readonly impersonatedAccount: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} */ readonly namespace?: string; /** * Email of the GCP service account. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} */ readonly serviceAccountEmail: string; /** * List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} */ readonly tokenScopes?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account} */ export class GcpSecretImpersonatedAccount extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class GcpSecretImpersonatedAccount extends cdktf.TerraformResource { * Generates CDKTF code for importing a GcpSecretImpersonatedAccount resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GcpSecretImpersonatedAccount to import - * @param importFromId The id of the existing GcpSecretImpersonatedAccount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GcpSecretImpersonatedAccount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GcpSecretImpersonatedAccount to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class GcpSecretImpersonatedAccount extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class GcpSecretImpersonatedAccount extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_secret_impersonated_account', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/gcp-secret-roleset/README.md b/src/gcp-secret-roleset/README.md index 6424450d..75e05c05 100644 --- a/src/gcp-secret-roleset/README.md +++ b/src/gcp-secret-roleset/README.md @@ -1,3 +1,3 @@ # `vault_gcp_secret_roleset` -Refer to the Terraform Registry for docs: [`vault_gcp_secret_roleset`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset). +Refer to the Terraform Registry for docs: [`vault_gcp_secret_roleset`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset). diff --git a/src/gcp-secret-roleset/index.ts b/src/gcp-secret-roleset/index.ts index 73bd43bb..56b4125f 100644 --- a/src/gcp-secret-roleset/index.ts +++ b/src/gcp-secret-roleset/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface GcpSecretRolesetConfig extends cdktf.TerraformMetaArguments { /** * Path where the GCP secrets engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,37 +28,37 @@ export interface GcpSecretRolesetConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} */ readonly namespace?: string; /** * Name of the GCP project that this roleset's service account will belong to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} */ readonly project: string; /** * Name of the RoleSet to create * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} */ readonly roleset: string; /** * Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key` * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} */ readonly secretType?: string; /** * List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} */ readonly tokenScopes?: string[]; /** * binding block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} */ readonly binding: GcpSecretRolesetBinding[] | cdktf.IResolvable; } @@ -66,13 +66,13 @@ export interface GcpSecretRolesetBinding { /** * Resource name * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} */ readonly resource: string; /** * List of roles to apply to the resource * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} */ readonly roles: string[]; } @@ -211,7 +211,7 @@ export class GcpSecretRolesetBindingList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset} */ export class GcpSecretRoleset extends cdktf.TerraformResource { @@ -227,7 +227,7 @@ export class GcpSecretRoleset extends cdktf.TerraformResource { * Generates CDKTF code for importing a GcpSecretRoleset resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GcpSecretRoleset to import - * @param importFromId The id of the existing GcpSecretRoleset that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GcpSecretRoleset that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GcpSecretRoleset to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -239,7 +239,7 @@ export class GcpSecretRoleset extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -250,8 +250,8 @@ export class GcpSecretRoleset extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_secret_roleset', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/gcp-secret-static-account/README.md b/src/gcp-secret-static-account/README.md index 7ecb9a40..a6242b53 100644 --- a/src/gcp-secret-static-account/README.md +++ b/src/gcp-secret-static-account/README.md @@ -1,3 +1,3 @@ # `vault_gcp_secret_static_account` -Refer to the Terraform Registry for docs: [`vault_gcp_secret_static_account`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account). +Refer to the Terraform Registry for docs: [`vault_gcp_secret_static_account`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account). diff --git a/src/gcp-secret-static-account/index.ts b/src/gcp-secret-static-account/index.ts index f5369dc4..4417d926 100644 --- a/src/gcp-secret-static-account/index.ts +++ b/src/gcp-secret-static-account/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface GcpSecretStaticAccountConfig extends cdktf.TerraformMetaArgumen /** * Path where the GCP secrets engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,37 +28,37 @@ export interface GcpSecretStaticAccountConfig extends cdktf.TerraformMetaArgumen /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} */ readonly namespace?: string; /** * Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key` * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} */ readonly secretType?: string; /** * Email of the GCP service account. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} */ readonly serviceAccountEmail: string; /** * Name of the Static Account to create * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} */ readonly staticAccount: string; /** * List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} */ readonly tokenScopes?: string[]; /** * binding block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} */ readonly binding?: GcpSecretStaticAccountBinding[] | cdktf.IResolvable; } @@ -66,13 +66,13 @@ export interface GcpSecretStaticAccountBinding { /** * Resource name * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} */ readonly resource: string; /** * List of roles to apply to the resource * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} */ readonly roles: string[]; } @@ -211,7 +211,7 @@ export class GcpSecretStaticAccountBindingList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account} */ export class GcpSecretStaticAccount extends cdktf.TerraformResource { @@ -227,7 +227,7 @@ export class GcpSecretStaticAccount extends cdktf.TerraformResource { * Generates CDKTF code for importing a GcpSecretStaticAccount resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GcpSecretStaticAccount to import - * @param importFromId The id of the existing GcpSecretStaticAccount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GcpSecretStaticAccount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GcpSecretStaticAccount to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -239,7 +239,7 @@ export class GcpSecretStaticAccount extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -250,8 +250,8 @@ export class GcpSecretStaticAccount extends cdktf.TerraformResource { terraformResourceType: 'vault_gcp_secret_static_account', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/generic-endpoint/README.md b/src/generic-endpoint/README.md index 40a2e3a2..a8820765 100644 --- a/src/generic-endpoint/README.md +++ b/src/generic-endpoint/README.md @@ -1,3 +1,3 @@ # `vault_generic_endpoint` -Refer to the Terraform Registry for docs: [`vault_generic_endpoint`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint). +Refer to the Terraform Registry for docs: [`vault_generic_endpoint`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint). diff --git a/src/generic-endpoint/index.ts b/src/generic-endpoint/index.ts index 1cc27191..dab880ac 100644 --- a/src/generic-endpoint/index.ts +++ b/src/generic-endpoint/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface GenericEndpointConfig extends cdktf.TerraformMetaArguments { /** * JSON-encoded data to write. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} */ readonly dataJson: string; /** * Don't attempt to delete the path from Vault if true * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} */ readonly disableDelete?: boolean | cdktf.IResolvable; /** * Don't attempt to read the path from Vault if true; drift won't be detected * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} */ readonly disableRead?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#id GenericEndpoint#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#id GenericEndpoint#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,31 +40,31 @@ export interface GenericEndpointConfig extends cdktf.TerraformMetaArguments { /** * When reading, disregard fields not present in data_json * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} */ readonly ignoreAbsentFields?: boolean | cdktf.IResolvable; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} */ readonly namespace?: string; /** * Full path where to the endpoint that will be written * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#path GenericEndpoint#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#path GenericEndpoint#path} */ readonly path: string; /** * Top-level fields returned by write to persist in state * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} */ readonly writeFields?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint vault_generic_endpoint} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint vault_generic_endpoint} */ export class GenericEndpoint extends cdktf.TerraformResource { @@ -80,7 +80,7 @@ export class GenericEndpoint extends cdktf.TerraformResource { * Generates CDKTF code for importing a GenericEndpoint resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GenericEndpoint to import - * @param importFromId The id of the existing GenericEndpoint that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GenericEndpoint that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GenericEndpoint to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +92,7 @@ export class GenericEndpoint extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_endpoint vault_generic_endpoint} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_endpoint vault_generic_endpoint} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +103,8 @@ export class GenericEndpoint extends cdktf.TerraformResource { terraformResourceType: 'vault_generic_endpoint', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/generic-secret/README.md b/src/generic-secret/README.md index 72e7c246..7f91d973 100644 --- a/src/generic-secret/README.md +++ b/src/generic-secret/README.md @@ -1,3 +1,3 @@ # `vault_generic_secret` -Refer to the Terraform Registry for docs: [`vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret). +Refer to the Terraform Registry for docs: [`vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret). diff --git a/src/generic-secret/index.ts b/src/generic-secret/index.ts index 1dc205df..4be6198b 100644 --- a/src/generic-secret/index.ts +++ b/src/generic-secret/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface GenericSecretConfig extends cdktf.TerraformMetaArguments { /** * JSON-encoded secret data to write. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#data_json GenericSecret#data_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#data_json GenericSecret#data_json} */ readonly dataJson: string; /** * Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} */ readonly deleteAllVersions?: boolean | cdktf.IResolvable; /** * Don't attempt to read the token from Vault if true; drift won't be detected. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} */ readonly disableRead?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#id GenericSecret#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#id GenericSecret#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,19 +40,19 @@ export interface GenericSecretConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#namespace GenericSecret#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#namespace GenericSecret#namespace} */ readonly namespace?: string; /** * Full path where the generic secret will be written. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#path GenericSecret#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#path GenericSecret#path} */ readonly path: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret vault_generic_secret} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret vault_generic_secret} */ export class GenericSecret extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class GenericSecret extends cdktf.TerraformResource { * Generates CDKTF code for importing a GenericSecret resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GenericSecret to import - * @param importFromId The id of the existing GenericSecret that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GenericSecret that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GenericSecret to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class GenericSecret extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/generic_secret vault_generic_secret} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/generic_secret vault_generic_secret} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class GenericSecret extends cdktf.TerraformResource { terraformResourceType: 'vault_generic_secret', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/github-auth-backend/README.md b/src/github-auth-backend/README.md index 0cded864..a64f8dde 100644 --- a/src/github-auth-backend/README.md +++ b/src/github-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_github_auth_backend` -Refer to the Terraform Registry for docs: [`vault_github_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend). +Refer to the Terraform Registry for docs: [`vault_github_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend). diff --git a/src/github-auth-backend/index.ts b/src/github-auth-backend/index.ts index 47338316..cbf8f4a2 100644 --- a/src/github-auth-backend/index.ts +++ b/src/github-auth-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface GithubAuthBackendConfig extends cdktf.TerraformMetaArguments { /** * The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} */ readonly baseUrl?: string; /** * Specifies the description of the mount. This overrides the current stored value, if any. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#id GithubAuthBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#id GithubAuthBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,117 +40,117 @@ export interface GithubAuthBackendConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} */ readonly namespace?: string; /** * The organization users must be part of. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} */ readonly organization: string; /** * The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} */ readonly organizationId?: number; /** * Path where the auth backend is mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} */ readonly path?: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} */ readonly tokenType?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune} */ readonly tune?: GithubAuthBackendTune[] | cdktf.IResolvable; } export interface GithubAuthBackendTune { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers} */ readonly allowedResponseHeaders?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys} */ readonly auditNonHmacRequestKeys?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys} */ readonly auditNonHmacResponseKeys?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl} */ readonly defaultLeaseTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility} */ readonly listingVisibility?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl} */ readonly maxLeaseTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers} */ readonly passthroughRequestHeaders?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} */ readonly tokenType?: string; } @@ -469,7 +469,7 @@ export class GithubAuthBackendTuneList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend vault_github_auth_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend vault_github_auth_backend} */ export class GithubAuthBackend extends cdktf.TerraformResource { @@ -485,7 +485,7 @@ export class GithubAuthBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a GithubAuthBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GithubAuthBackend to import - * @param importFromId The id of the existing GithubAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GithubAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GithubAuthBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -497,7 +497,7 @@ export class GithubAuthBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_auth_backend vault_github_auth_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_auth_backend vault_github_auth_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -508,8 +508,8 @@ export class GithubAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_github_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/github-team/README.md b/src/github-team/README.md index 8cedf205..0eebc9d2 100644 --- a/src/github-team/README.md +++ b/src/github-team/README.md @@ -1,3 +1,3 @@ # `vault_github_team` -Refer to the Terraform Registry for docs: [`vault_github_team`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team). +Refer to the Terraform Registry for docs: [`vault_github_team`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team). diff --git a/src/github-team/index.ts b/src/github-team/index.ts index 7e7369eb..393291ad 100644 --- a/src/github-team/index.ts +++ b/src/github-team/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface GithubTeamConfig extends cdktf.TerraformMetaArguments { /** * Auth backend to which team mapping will be configured. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#backend GithubTeam#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#backend GithubTeam#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#id GithubTeam#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#id GithubTeam#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface GithubTeamConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#namespace GithubTeam#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#namespace GithubTeam#namespace} */ readonly namespace?: string; /** * Policies to be assigned to this team. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#policies GithubTeam#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#policies GithubTeam#policies} */ readonly policies?: string[]; /** * GitHub team name in "slugified" format. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#team GithubTeam#team} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#team GithubTeam#team} */ readonly team: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team vault_github_team} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team vault_github_team} */ export class GithubTeam extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class GithubTeam extends cdktf.TerraformResource { * Generates CDKTF code for importing a GithubTeam resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GithubTeam to import - * @param importFromId The id of the existing GithubTeam that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GithubTeam that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GithubTeam to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class GithubTeam extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_team vault_github_team} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_team vault_github_team} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class GithubTeam extends cdktf.TerraformResource { terraformResourceType: 'vault_github_team', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/github-user/README.md b/src/github-user/README.md index dffbd4dc..5cf12dcc 100644 --- a/src/github-user/README.md +++ b/src/github-user/README.md @@ -1,3 +1,3 @@ # `vault_github_user` -Refer to the Terraform Registry for docs: [`vault_github_user`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user). +Refer to the Terraform Registry for docs: [`vault_github_user`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user). diff --git a/src/github-user/index.ts b/src/github-user/index.ts index fa691439..813183aa 100644 --- a/src/github-user/index.ts +++ b/src/github-user/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface GithubUserConfig extends cdktf.TerraformMetaArguments { /** * Auth backend to which user mapping will be congigured. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#backend GithubUser#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#backend GithubUser#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#id GithubUser#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#id GithubUser#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface GithubUserConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#namespace GithubUser#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#namespace GithubUser#namespace} */ readonly namespace?: string; /** * Policies to be assigned to this user. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#policies GithubUser#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#policies GithubUser#policies} */ readonly policies?: string[]; /** * GitHub user name. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#user GithubUser#user} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#user GithubUser#user} */ readonly user: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user vault_github_user} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user vault_github_user} */ export class GithubUser extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class GithubUser extends cdktf.TerraformResource { * Generates CDKTF code for importing a GithubUser resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the GithubUser to import - * @param importFromId The id of the existing GithubUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing GithubUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the GithubUser to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class GithubUser extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/github_user vault_github_user} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/github_user vault_github_user} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class GithubUser extends cdktf.TerraformResource { terraformResourceType: 'vault_github_user', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-entity-alias/README.md b/src/identity-entity-alias/README.md index 519f16bd..4ffc6c42 100644 --- a/src/identity-entity-alias/README.md +++ b/src/identity-entity-alias/README.md @@ -1,3 +1,3 @@ # `vault_identity_entity_alias` -Refer to the Terraform Registry for docs: [`vault_identity_entity_alias`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias). +Refer to the Terraform Registry for docs: [`vault_identity_entity_alias`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias). diff --git a/src/identity-entity-alias/index.ts b/src/identity-entity-alias/index.ts index b9c1ab95..f537f8f2 100644 --- a/src/identity-entity-alias/index.ts +++ b/src/identity-entity-alias/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityEntityAliasConfig extends cdktf.TerraformMetaArguments /** * ID of the entity to which this is an alias. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} */ readonly canonicalId: string; /** * Custom metadata to be associated with this alias. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} */ readonly customMetadata?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,25 +34,25 @@ export interface IdentityEntityAliasConfig extends cdktf.TerraformMetaArguments /** * Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} */ readonly mountAccessor: string; /** * Name of the entity alias. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias vault_identity_entity_alias} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias vault_identity_entity_alias} */ export class IdentityEntityAlias extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class IdentityEntityAlias extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityEntityAlias resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityEntityAlias to import - * @param importFromId The id of the existing IdentityEntityAlias that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityEntityAlias that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityEntityAlias to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class IdentityEntityAlias extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_alias vault_identity_entity_alias} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_alias vault_identity_entity_alias} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class IdentityEntityAlias extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_entity_alias', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-entity-policies/README.md b/src/identity-entity-policies/README.md index 62b130cb..5c521a28 100644 --- a/src/identity-entity-policies/README.md +++ b/src/identity-entity-policies/README.md @@ -1,3 +1,3 @@ # `vault_identity_entity_policies` -Refer to the Terraform Registry for docs: [`vault_identity_entity_policies`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies). +Refer to the Terraform Registry for docs: [`vault_identity_entity_policies`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies). diff --git a/src/identity-entity-policies/index.ts b/src/identity-entity-policies/index.ts index 48ec0dbe..086bded6 100644 --- a/src/identity-entity-policies/index.ts +++ b/src/identity-entity-policies/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityEntityPoliciesConfig extends cdktf.TerraformMetaArgumen /** * ID of the entity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} */ readonly entityId: string; /** * Should the resource manage policies exclusively * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} */ readonly exclusive?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,19 +34,19 @@ export interface IdentityEntityPoliciesConfig extends cdktf.TerraformMetaArgumen /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} */ readonly namespace?: string; /** * Policies to be tied to the entity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} */ readonly policies: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies vault_identity_entity_policies} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies vault_identity_entity_policies} */ export class IdentityEntityPolicies extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class IdentityEntityPolicies extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityEntityPolicies resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityEntityPolicies to import - * @param importFromId The id of the existing IdentityEntityPolicies that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityEntityPolicies that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityEntityPolicies to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class IdentityEntityPolicies extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity_policies vault_identity_entity_policies} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity_policies vault_identity_entity_policies} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class IdentityEntityPolicies extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_entity_policies', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-entity/README.md b/src/identity-entity/README.md index 8f37d840..afa802b3 100644 --- a/src/identity-entity/README.md +++ b/src/identity-entity/README.md @@ -1,3 +1,3 @@ # `vault_identity_entity` -Refer to the Terraform Registry for docs: [`vault_identity_entity`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity). +Refer to the Terraform Registry for docs: [`vault_identity_entity`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity). diff --git a/src/identity-entity/index.ts b/src/identity-entity/index.ts index db92206a..757c3501 100644 --- a/src/identity-entity/index.ts +++ b/src/identity-entity/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityEntityConfig extends cdktf.TerraformMetaArguments { /** * Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} */ readonly disabled?: boolean | cdktf.IResolvable; /** * Manage policies externally through `vault_identity_entity_policies`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} */ readonly externalPolicies?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#id IdentityEntity#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#id IdentityEntity#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,31 +34,31 @@ export interface IdentityEntityConfig extends cdktf.TerraformMetaArguments { /** * Metadata to be associated with the entity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} */ readonly metadata?: { [key: string]: string }; /** * Name of the entity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#name IdentityEntity#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#name IdentityEntity#name} */ readonly name?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} */ readonly namespace?: string; /** * Policies to be tied to the entity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#policies IdentityEntity#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#policies IdentityEntity#policies} */ readonly policies?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity vault_identity_entity} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity vault_identity_entity} */ export class IdentityEntity extends cdktf.TerraformResource { @@ -74,7 +74,7 @@ export class IdentityEntity extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityEntity resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityEntity to import - * @param importFromId The id of the existing IdentityEntity that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityEntity that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityEntity to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class IdentityEntity extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_entity vault_identity_entity} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_entity vault_identity_entity} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class IdentityEntity extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_entity', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-group-alias/README.md b/src/identity-group-alias/README.md index 62fbe973..37192186 100644 --- a/src/identity-group-alias/README.md +++ b/src/identity-group-alias/README.md @@ -1,3 +1,3 @@ # `vault_identity_group_alias` -Refer to the Terraform Registry for docs: [`vault_identity_group_alias`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias). +Refer to the Terraform Registry for docs: [`vault_identity_group_alias`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias). diff --git a/src/identity-group-alias/index.ts b/src/identity-group-alias/index.ts index caec31e2..5157e200 100644 --- a/src/identity-group-alias/index.ts +++ b/src/identity-group-alias/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface IdentityGroupAliasConfig extends cdktf.TerraformMetaArguments { /** * ID of the group to which this is an alias. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} */ readonly canonicalId: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface IdentityGroupAliasConfig extends cdktf.TerraformMetaArguments { /** * Mount accessor to which this alias belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} */ readonly mountAccessor: string; /** * Name of the group alias. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias vault_identity_group_alias} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias vault_identity_group_alias} */ export class IdentityGroupAlias extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class IdentityGroupAlias extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityGroupAlias resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityGroupAlias to import - * @param importFromId The id of the existing IdentityGroupAlias that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityGroupAlias that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityGroupAlias to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class IdentityGroupAlias extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_alias vault_identity_group_alias} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_alias vault_identity_group_alias} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class IdentityGroupAlias extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group_alias', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-group-member-entity-ids/README.md b/src/identity-group-member-entity-ids/README.md index 2af1322f..dfe6d975 100644 --- a/src/identity-group-member-entity-ids/README.md +++ b/src/identity-group-member-entity-ids/README.md @@ -1,3 +1,3 @@ # `vault_identity_group_member_entity_ids` -Refer to the Terraform Registry for docs: [`vault_identity_group_member_entity_ids`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids). +Refer to the Terraform Registry for docs: [`vault_identity_group_member_entity_ids`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids). diff --git a/src/identity-group-member-entity-ids/index.ts b/src/identity-group-member-entity-ids/index.ts index 67b6fe0b..01ca6058 100644 --- a/src/identity-group-member-entity-ids/index.ts +++ b/src/identity-group-member-entity-ids/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids // generated from terraform resource schema import { Construct } from 'constructs'; @@ -16,17 +16,17 @@ export interface IdentityGroupMemberEntityIdsConfig extends cdktf.TerraformMetaA * If set to true, allows the resource to manage member entity ids * exclusively. Beware of race conditions when disabling exclusive management * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} */ readonly exclusive?: boolean | cdktf.IResolvable; /** * ID of the group. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} */ readonly groupId: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -35,19 +35,19 @@ export interface IdentityGroupMemberEntityIdsConfig extends cdktf.TerraformMetaA /** * Entity IDs to be assigned as group members. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} */ readonly memberEntityIds?: string[]; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids} */ export class IdentityGroupMemberEntityIds extends cdktf.TerraformResource { @@ -63,7 +63,7 @@ export class IdentityGroupMemberEntityIds extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityGroupMemberEntityIds resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityGroupMemberEntityIds to import - * @param importFromId The id of the existing IdentityGroupMemberEntityIds that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityGroupMemberEntityIds that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityGroupMemberEntityIds to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -75,7 +75,7 @@ export class IdentityGroupMemberEntityIds extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -86,8 +86,8 @@ export class IdentityGroupMemberEntityIds extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group_member_entity_ids', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -137,11 +137,6 @@ export class IdentityGroupMemberEntityIds extends cdktf.TerraformResource { return this._groupId; } - // group_name - computed: true, optional: false, required: false - public get groupName() { - return this.getStringAttribute('group_name'); - } - // id - computed: true, optional: true, required: false private _id?: string; public get id() { diff --git a/src/identity-group-member-group-ids/README.md b/src/identity-group-member-group-ids/README.md index cf5ab80a..636fd362 100644 --- a/src/identity-group-member-group-ids/README.md +++ b/src/identity-group-member-group-ids/README.md @@ -1,3 +1,3 @@ # `vault_identity_group_member_group_ids` -Refer to the Terraform Registry for docs: [`vault_identity_group_member_group_ids`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids). +Refer to the Terraform Registry for docs: [`vault_identity_group_member_group_ids`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids). diff --git a/src/identity-group-member-group-ids/index.ts b/src/identity-group-member-group-ids/index.ts index cbe867c3..139486ae 100644 --- a/src/identity-group-member-group-ids/index.ts +++ b/src/identity-group-member-group-ids/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids // generated from terraform resource schema import { Construct } from 'constructs'; @@ -16,17 +16,17 @@ export interface IdentityGroupMemberGroupIdsConfig extends cdktf.TerraformMetaAr * If set to true, allows the resource to manage member group ids * exclusively. Beware of race conditions when disabling exclusive management * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} */ readonly exclusive?: boolean | cdktf.IResolvable; /** * ID of the group. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} */ readonly groupId: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -35,19 +35,19 @@ export interface IdentityGroupMemberGroupIdsConfig extends cdktf.TerraformMetaAr /** * Group IDs to be assigned as group members. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} */ readonly memberGroupIds?: string[]; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids} */ export class IdentityGroupMemberGroupIds extends cdktf.TerraformResource { @@ -63,7 +63,7 @@ export class IdentityGroupMemberGroupIds extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityGroupMemberGroupIds resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityGroupMemberGroupIds to import - * @param importFromId The id of the existing IdentityGroupMemberGroupIds that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityGroupMemberGroupIds that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityGroupMemberGroupIds to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -75,7 +75,7 @@ export class IdentityGroupMemberGroupIds extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -86,8 +86,8 @@ export class IdentityGroupMemberGroupIds extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group_member_group_ids', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-group-policies/README.md b/src/identity-group-policies/README.md index 12c1690d..928e0716 100644 --- a/src/identity-group-policies/README.md +++ b/src/identity-group-policies/README.md @@ -1,3 +1,3 @@ # `vault_identity_group_policies` -Refer to the Terraform Registry for docs: [`vault_identity_group_policies`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies). +Refer to the Terraform Registry for docs: [`vault_identity_group_policies`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies). diff --git a/src/identity-group-policies/index.ts b/src/identity-group-policies/index.ts index 5e50f7cd..48076f40 100644 --- a/src/identity-group-policies/index.ts +++ b/src/identity-group-policies/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityGroupPoliciesConfig extends cdktf.TerraformMetaArgument /** * Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} */ readonly exclusive?: boolean | cdktf.IResolvable; /** * ID of the group. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} */ readonly groupId: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,19 +34,19 @@ export interface IdentityGroupPoliciesConfig extends cdktf.TerraformMetaArgument /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} */ readonly namespace?: string; /** * Policies to be tied to the group. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} */ readonly policies: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies vault_identity_group_policies} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies vault_identity_group_policies} */ export class IdentityGroupPolicies extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class IdentityGroupPolicies extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityGroupPolicies resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityGroupPolicies to import - * @param importFromId The id of the existing IdentityGroupPolicies that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityGroupPolicies that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityGroupPolicies to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class IdentityGroupPolicies extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group_policies vault_identity_group_policies} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group_policies vault_identity_group_policies} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class IdentityGroupPolicies extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group_policies', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-group/README.md b/src/identity-group/README.md index 07395c76..4667227c 100644 --- a/src/identity-group/README.md +++ b/src/identity-group/README.md @@ -1,3 +1,3 @@ # `vault_identity_group` -Refer to the Terraform Registry for docs: [`vault_identity_group`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group). +Refer to the Terraform Registry for docs: [`vault_identity_group`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group). diff --git a/src/identity-group/index.ts b/src/identity-group/index.ts index c4a825a8..b31bc814 100644 --- a/src/identity-group/index.ts +++ b/src/identity-group/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface IdentityGroupConfig extends cdktf.TerraformMetaArguments { /** * Manage member entities externally through `vault_identity_group_member_entity_ids` * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} */ readonly externalMemberEntityIds?: boolean | cdktf.IResolvable; /** * Manage member groups externally through `vault_identity_group_member_group_ids` * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} */ readonly externalMemberGroupIds?: boolean | cdktf.IResolvable; /** * Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} */ readonly externalPolicies?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#id IdentityGroup#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#id IdentityGroup#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,49 +40,49 @@ export interface IdentityGroupConfig extends cdktf.TerraformMetaArguments { /** * Entity IDs to be assigned as group members. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} */ readonly memberEntityIds?: string[]; /** * Group IDs to be assigned as group members. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} */ readonly memberGroupIds?: string[]; /** * Metadata to be associated with the group. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#metadata IdentityGroup#metadata} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#metadata IdentityGroup#metadata} */ readonly metadata?: { [key: string]: string }; /** * Name of the group. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#name IdentityGroup#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#name IdentityGroup#name} */ readonly name?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#namespace IdentityGroup#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#namespace IdentityGroup#namespace} */ readonly namespace?: string; /** * Policies to be tied to the group. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#policies IdentityGroup#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#policies IdentityGroup#policies} */ readonly policies?: string[]; /** * Type of the group, internal or external. Defaults to internal. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#type IdentityGroup#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#type IdentityGroup#type} */ readonly type?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group vault_identity_group} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group vault_identity_group} */ export class IdentityGroup extends cdktf.TerraformResource { @@ -98,7 +98,7 @@ export class IdentityGroup extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityGroup resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityGroup to import - * @param importFromId The id of the existing IdentityGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityGroup to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -110,7 +110,7 @@ export class IdentityGroup extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_group vault_identity_group} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_group vault_identity_group} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -121,8 +121,8 @@ export class IdentityGroup extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_group', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-mfa-duo/README.md b/src/identity-mfa-duo/README.md index 6e38a11b..258f992f 100644 --- a/src/identity-mfa-duo/README.md +++ b/src/identity-mfa-duo/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_duo` -Refer to the Terraform Registry for docs: [`vault_identity_mfa_duo`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_duo`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo). diff --git a/src/identity-mfa-duo/index.ts b/src/identity-mfa-duo/index.ts index 3ad8d3d6..e6f55e8b 100644 --- a/src/identity-mfa-duo/index.ts +++ b/src/identity-mfa-duo/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface IdentityMfaDuoConfig extends cdktf.TerraformMetaArguments { /** * API hostname for Duo * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} */ readonly apiHostname: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,43 +28,43 @@ export interface IdentityMfaDuoConfig extends cdktf.TerraformMetaArguments { /** * Integration key for Duo * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} */ readonly integrationKey: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} */ readonly namespace?: string; /** * Push information for Duo. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} */ readonly pushInfo?: string; /** * Secret key for Duo * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} */ readonly secretKey: string; /** * Require passcode upon MFA validation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} */ readonly usePasscode?: boolean | cdktf.IResolvable; /** * A template string for mapping Identity names to MFA methods. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} */ readonly usernameFormat?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo} */ export class IdentityMfaDuo extends cdktf.TerraformResource { @@ -80,7 +80,7 @@ export class IdentityMfaDuo extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityMfaDuo resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityMfaDuo to import - * @param importFromId The id of the existing IdentityMfaDuo that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityMfaDuo that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityMfaDuo to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +92,7 @@ export class IdentityMfaDuo extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +103,8 @@ export class IdentityMfaDuo extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_duo', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-mfa-login-enforcement/README.md b/src/identity-mfa-login-enforcement/README.md index 9d18d90e..3ee5cfbd 100644 --- a/src/identity-mfa-login-enforcement/README.md +++ b/src/identity-mfa-login-enforcement/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_login_enforcement` -Refer to the Terraform Registry for docs: [`vault_identity_mfa_login_enforcement`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_login_enforcement`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement). diff --git a/src/identity-mfa-login-enforcement/index.ts b/src/identity-mfa-login-enforcement/index.ts index 3a422b12..f555f8ed 100644 --- a/src/identity-mfa-login-enforcement/index.ts +++ b/src/identity-mfa-login-enforcement/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityMfaLoginEnforcementConfig extends cdktf.TerraformMetaAr /** * Set of auth method accessor IDs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} */ readonly authMethodAccessors?: string[]; /** * Set of auth method types. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} */ readonly authMethodTypes?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,37 +34,37 @@ export interface IdentityMfaLoginEnforcementConfig extends cdktf.TerraformMetaAr /** * Set of identity entity IDs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} */ readonly identityEntityIds?: string[]; /** * Set of identity group IDs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} */ readonly identityGroupIds?: string[]; /** * Set of MFA method UUIDs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} */ readonly mfaMethodIds: string[]; /** * Login enforcement name. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement} */ export class IdentityMfaLoginEnforcement extends cdktf.TerraformResource { @@ -80,7 +80,7 @@ export class IdentityMfaLoginEnforcement extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityMfaLoginEnforcement resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityMfaLoginEnforcement to import - * @param importFromId The id of the existing IdentityMfaLoginEnforcement that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityMfaLoginEnforcement that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityMfaLoginEnforcement to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +92,7 @@ export class IdentityMfaLoginEnforcement extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +103,8 @@ export class IdentityMfaLoginEnforcement extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_login_enforcement', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-mfa-okta/README.md b/src/identity-mfa-okta/README.md index 3b509105..5d56f44c 100644 --- a/src/identity-mfa-okta/README.md +++ b/src/identity-mfa-okta/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_okta` -Refer to the Terraform Registry for docs: [`vault_identity_mfa_okta`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_okta`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta). diff --git a/src/identity-mfa-okta/index.ts b/src/identity-mfa-okta/index.ts index 922acdf6..dc863a74 100644 --- a/src/identity-mfa-okta/index.ts +++ b/src/identity-mfa-okta/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityMfaOktaConfig extends cdktf.TerraformMetaArguments { /** * Okta API token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} */ readonly apiToken: string; /** * The base domain to use for API requests. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} */ readonly baseUrl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,31 +34,31 @@ export interface IdentityMfaOktaConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} */ readonly namespace?: string; /** * Name of the organization to be used in the Okta API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} */ readonly orgName: string; /** * Only match the primary email for the account. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} */ readonly primaryEmail?: boolean | cdktf.IResolvable; /** * A template string for mapping Identity names to MFA methods. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} */ readonly usernameFormat?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta} */ export class IdentityMfaOkta extends cdktf.TerraformResource { @@ -74,7 +74,7 @@ export class IdentityMfaOkta extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityMfaOkta resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityMfaOkta to import - * @param importFromId The id of the existing IdentityMfaOkta that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityMfaOkta that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityMfaOkta to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class IdentityMfaOkta extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class IdentityMfaOkta extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_okta', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-mfa-pingid/README.md b/src/identity-mfa-pingid/README.md index 84ef8bf6..a2a829ec 100644 --- a/src/identity-mfa-pingid/README.md +++ b/src/identity-mfa-pingid/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_pingid` -Refer to the Terraform Registry for docs: [`vault_identity_mfa_pingid`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_pingid`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid). diff --git a/src/identity-mfa-pingid/index.ts b/src/identity-mfa-pingid/index.ts index c2e8757a..9e458fdb 100644 --- a/src/identity-mfa-pingid/index.ts +++ b/src/identity-mfa-pingid/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface IdentityMfaPingidConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,25 +22,25 @@ export interface IdentityMfaPingidConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} */ readonly namespace?: string; /** * A base64-encoded third-party settings contents as retrieved from PingID's configuration page. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} */ readonly settingsFileBase64: string; /** * A template string for mapping Identity names to MFA methods. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} */ readonly usernameFormat?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid} */ export class IdentityMfaPingid extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class IdentityMfaPingid extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityMfaPingid resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityMfaPingid to import - * @param importFromId The id of the existing IdentityMfaPingid that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityMfaPingid that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityMfaPingid to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class IdentityMfaPingid extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class IdentityMfaPingid extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_pingid', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-mfa-totp/README.md b/src/identity-mfa-totp/README.md index 386e2812..3c64ca4a 100644 --- a/src/identity-mfa-totp/README.md +++ b/src/identity-mfa-totp/README.md @@ -1,3 +1,3 @@ # `vault_identity_mfa_totp` -Refer to the Terraform Registry for docs: [`vault_identity_mfa_totp`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp). +Refer to the Terraform Registry for docs: [`vault_identity_mfa_totp`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp). diff --git a/src/identity-mfa-totp/index.ts b/src/identity-mfa-totp/index.ts index bb118b29..a4056bfa 100644 --- a/src/identity-mfa-totp/index.ts +++ b/src/identity-mfa-totp/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityMfaTotpConfig extends cdktf.TerraformMetaArguments { /** * Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} */ readonly algorithm?: string; /** * The number of digits in the generated TOTP token. This value can either be 6 or 8 * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} */ readonly digits?: number; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,49 +34,49 @@ export interface IdentityMfaTotpConfig extends cdktf.TerraformMetaArguments { /** * The name of the key's issuing organization. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} */ readonly issuer: string; /** * Specifies the size in bytes of the generated key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} */ readonly keySize?: number; /** * The maximum number of consecutive failed validation attempts allowed. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} */ readonly maxValidationAttempts?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} */ readonly namespace?: string; /** * The length of time in seconds used to generate a counter for the TOTP token calculation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} */ readonly period?: number; /** * The pixel size of the generated square QR code. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} */ readonly qrSize?: number; /** * The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} */ readonly skew?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp} */ export class IdentityMfaTotp extends cdktf.TerraformResource { @@ -92,7 +92,7 @@ export class IdentityMfaTotp extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityMfaTotp resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityMfaTotp to import - * @param importFromId The id of the existing IdentityMfaTotp that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityMfaTotp that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityMfaTotp to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -104,7 +104,7 @@ export class IdentityMfaTotp extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -115,8 +115,8 @@ export class IdentityMfaTotp extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_mfa_totp', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-oidc-assignment/README.md b/src/identity-oidc-assignment/README.md index 2852cdcc..cf509699 100644 --- a/src/identity-oidc-assignment/README.md +++ b/src/identity-oidc-assignment/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_assignment` -Refer to the Terraform Registry for docs: [`vault_identity_oidc_assignment`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_assignment`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment). diff --git a/src/identity-oidc-assignment/index.ts b/src/identity-oidc-assignment/index.ts index 16a556ea..593b0c1d 100644 --- a/src/identity-oidc-assignment/index.ts +++ b/src/identity-oidc-assignment/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityOidcAssignmentConfig extends cdktf.TerraformMetaArgumen /** * A list of Vault entity IDs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} */ readonly entityIds?: string[]; /** * A list of Vault group IDs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} */ readonly groupIds?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,19 +34,19 @@ export interface IdentityOidcAssignmentConfig extends cdktf.TerraformMetaArgumen /** * The name of the assignment. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment} */ export class IdentityOidcAssignment extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class IdentityOidcAssignment extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityOidcAssignment resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityOidcAssignment to import - * @param importFromId The id of the existing IdentityOidcAssignment that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityOidcAssignment that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityOidcAssignment to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class IdentityOidcAssignment extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class IdentityOidcAssignment extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_assignment', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-oidc-client/README.md b/src/identity-oidc-client/README.md index 22eb79a6..a5a6a86f 100644 --- a/src/identity-oidc-client/README.md +++ b/src/identity-oidc-client/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_client` -Refer to the Terraform Registry for docs: [`vault_identity_oidc_client`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_client`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client). diff --git a/src/identity-oidc-client/index.ts b/src/identity-oidc-client/index.ts index 42b7770e..b0467b12 100644 --- a/src/identity-oidc-client/index.ts +++ b/src/identity-oidc-client/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface IdentityOidcClientConfig extends cdktf.TerraformMetaArguments { /** * The time-to-live for access tokens obtained by the client. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} */ readonly accessTokenTtl?: number; /** * A list of assignment resources associated with the client. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} */ readonly assignments?: string[]; /** * The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} */ readonly clientType?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,37 +40,37 @@ export interface IdentityOidcClientConfig extends cdktf.TerraformMetaArguments { /** * The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} */ readonly idTokenTtl?: number; /** * A reference to a named key resource in Vault. This cannot be modified after creation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} */ readonly key?: string; /** * The name of the client. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} */ readonly namespace?: string; /** * Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} */ readonly redirectUris?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client vault_identity_oidc_client} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client vault_identity_oidc_client} */ export class IdentityOidcClient extends cdktf.TerraformResource { @@ -86,7 +86,7 @@ export class IdentityOidcClient extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityOidcClient resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityOidcClient to import - * @param importFromId The id of the existing IdentityOidcClient that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityOidcClient that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityOidcClient to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -98,7 +98,7 @@ export class IdentityOidcClient extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_client vault_identity_oidc_client} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_client vault_identity_oidc_client} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -109,8 +109,8 @@ export class IdentityOidcClient extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_client', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-oidc-key-allowed-client-id/README.md b/src/identity-oidc-key-allowed-client-id/README.md index 8e2c840d..cf3a3537 100644 --- a/src/identity-oidc-key-allowed-client-id/README.md +++ b/src/identity-oidc-key-allowed-client-id/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_key_allowed_client_id` -Refer to the Terraform Registry for docs: [`vault_identity_oidc_key_allowed_client_id`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_key_allowed_client_id`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id). diff --git a/src/identity-oidc-key-allowed-client-id/index.ts b/src/identity-oidc-key-allowed-client-id/index.ts index 2fe3a679..a4a19640 100644 --- a/src/identity-oidc-key-allowed-client-id/index.ts +++ b/src/identity-oidc-key-allowed-client-id/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface IdentityOidcKeyAllowedClientIdConfig extends cdktf.TerraformMet /** * Role Client ID allowed to use the key for signing. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} */ readonly allowedClientId: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface IdentityOidcKeyAllowedClientIdConfig extends cdktf.TerraformMet /** * Name of the key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} */ readonly keyName: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id} */ export class IdentityOidcKeyAllowedClientId extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class IdentityOidcKeyAllowedClientId extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityOidcKeyAllowedClientId resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityOidcKeyAllowedClientId to import - * @param importFromId The id of the existing IdentityOidcKeyAllowedClientId that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityOidcKeyAllowedClientId that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityOidcKeyAllowedClientId to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class IdentityOidcKeyAllowedClientId extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class IdentityOidcKeyAllowedClientId extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_key_allowed_client_id', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-oidc-key/README.md b/src/identity-oidc-key/README.md index 9905df6f..4ebe79be 100644 --- a/src/identity-oidc-key/README.md +++ b/src/identity-oidc-key/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_key` -Refer to the Terraform Registry for docs: [`vault_identity_oidc_key`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_key`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key). diff --git a/src/identity-oidc-key/index.ts b/src/identity-oidc-key/index.ts index 23a3adaf..4cd2de94 100644 --- a/src/identity-oidc-key/index.ts +++ b/src/identity-oidc-key/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityOidcKeyConfig extends cdktf.TerraformMetaArguments { /** * Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} */ readonly algorithm?: string; /** * Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} */ readonly allowedClientIds?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,31 +34,31 @@ export interface IdentityOidcKeyConfig extends cdktf.TerraformMetaArguments { /** * Name of the key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} */ readonly namespace?: string; /** * How often to generate a new signing key in number of seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} */ readonly rotationPeriod?: number; /** * Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} */ readonly verificationTtl?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key vault_identity_oidc_key} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key vault_identity_oidc_key} */ export class IdentityOidcKey extends cdktf.TerraformResource { @@ -74,7 +74,7 @@ export class IdentityOidcKey extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityOidcKey resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityOidcKey to import - * @param importFromId The id of the existing IdentityOidcKey that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityOidcKey that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityOidcKey to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class IdentityOidcKey extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_key vault_identity_oidc_key} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_key vault_identity_oidc_key} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class IdentityOidcKey extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_key', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-oidc-provider/README.md b/src/identity-oidc-provider/README.md index 161cd00f..bef563eb 100644 --- a/src/identity-oidc-provider/README.md +++ b/src/identity-oidc-provider/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_provider` -Refer to the Terraform Registry for docs: [`vault_identity_oidc_provider`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_provider`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider). diff --git a/src/identity-oidc-provider/index.ts b/src/identity-oidc-provider/index.ts index 2cda2568..87264233 100644 --- a/src/identity-oidc-provider/index.ts +++ b/src/identity-oidc-provider/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface IdentityOidcProviderConfig extends cdktf.TerraformMetaArguments /** * The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} */ readonly allowedClientIds?: string[]; /** * Set to true if the issuer endpoint uses HTTPS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} */ readonly httpsEnabled?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,31 +34,31 @@ export interface IdentityOidcProviderConfig extends cdktf.TerraformMetaArguments /** * The host for the issuer. Can be either host or host:port. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} */ readonly issuerHost?: string; /** * The name of the provider. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} */ readonly namespace?: string; /** * The scopes available for requesting on the provider. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} */ readonly scopesSupported?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider} */ export class IdentityOidcProvider extends cdktf.TerraformResource { @@ -74,7 +74,7 @@ export class IdentityOidcProvider extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityOidcProvider resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityOidcProvider to import - * @param importFromId The id of the existing IdentityOidcProvider that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityOidcProvider that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityOidcProvider to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class IdentityOidcProvider extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class IdentityOidcProvider extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_provider', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-oidc-role/README.md b/src/identity-oidc-role/README.md index b00d7e7d..02ec11d9 100644 --- a/src/identity-oidc-role/README.md +++ b/src/identity-oidc-role/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_role` -Refer to the Terraform Registry for docs: [`vault_identity_oidc_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role). diff --git a/src/identity-oidc-role/index.ts b/src/identity-oidc-role/index.ts index 5ec2efcc..c8bedb38 100644 --- a/src/identity-oidc-role/index.ts +++ b/src/identity-oidc-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface IdentityOidcRoleConfig extends cdktf.TerraformMetaArguments { /** * The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} */ readonly clientId?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,37 +28,37 @@ export interface IdentityOidcRoleConfig extends cdktf.TerraformMetaArguments { /** * A configured named key, the key must already exist. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} */ readonly key: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} */ readonly namespace?: string; /** * The template string to use for generating tokens. This may be in string-ified JSON or base64 format. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} */ readonly template?: string; /** * TTL of the tokens generated against the role in number of seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} */ readonly ttl?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role vault_identity_oidc_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role vault_identity_oidc_role} */ export class IdentityOidcRole extends cdktf.TerraformResource { @@ -74,7 +74,7 @@ export class IdentityOidcRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityOidcRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityOidcRole to import - * @param importFromId The id of the existing IdentityOidcRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityOidcRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityOidcRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class IdentityOidcRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_role vault_identity_oidc_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_role vault_identity_oidc_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class IdentityOidcRole extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-oidc-scope/README.md b/src/identity-oidc-scope/README.md index b96bb616..25686224 100644 --- a/src/identity-oidc-scope/README.md +++ b/src/identity-oidc-scope/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc_scope` -Refer to the Terraform Registry for docs: [`vault_identity_oidc_scope`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope). +Refer to the Terraform Registry for docs: [`vault_identity_oidc_scope`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope). diff --git a/src/identity-oidc-scope/index.ts b/src/identity-oidc-scope/index.ts index 73bbb99b..3aefc72f 100644 --- a/src/identity-oidc-scope/index.ts +++ b/src/identity-oidc-scope/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface IdentityOidcScopeConfig extends cdktf.TerraformMetaArguments { /** * The scope's description. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} */ readonly description?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface IdentityOidcScopeConfig extends cdktf.TerraformMetaArguments { /** * The name of the scope. The openid scope name is reserved. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} */ readonly namespace?: string; /** * The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} */ readonly template?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope} */ export class IdentityOidcScope extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class IdentityOidcScope extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityOidcScope resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityOidcScope to import - * @param importFromId The id of the existing IdentityOidcScope that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityOidcScope that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityOidcScope to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class IdentityOidcScope extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class IdentityOidcScope extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc_scope', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/identity-oidc/README.md b/src/identity-oidc/README.md index 5c61a534..e2d984b9 100644 --- a/src/identity-oidc/README.md +++ b/src/identity-oidc/README.md @@ -1,3 +1,3 @@ # `vault_identity_oidc` -Refer to the Terraform Registry for docs: [`vault_identity_oidc`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc). +Refer to the Terraform Registry for docs: [`vault_identity_oidc`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc). diff --git a/src/identity-oidc/index.ts b/src/identity-oidc/index.ts index 8e43e687..b3d4b430 100644 --- a/src/identity-oidc/index.ts +++ b/src/identity-oidc/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface IdentityOidcConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#id IdentityOidc#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#id IdentityOidc#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,19 +22,19 @@ export interface IdentityOidcConfig extends cdktf.TerraformMetaArguments { /** * Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} */ readonly issuer?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc vault_identity_oidc} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc vault_identity_oidc} */ export class IdentityOidc extends cdktf.TerraformResource { @@ -50,7 +50,7 @@ export class IdentityOidc extends cdktf.TerraformResource { * Generates CDKTF code for importing a IdentityOidc resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the IdentityOidc to import - * @param importFromId The id of the existing IdentityOidc that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing IdentityOidc that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the IdentityOidc to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -62,7 +62,7 @@ export class IdentityOidc extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/identity_oidc vault_identity_oidc} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/identity_oidc vault_identity_oidc} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -73,8 +73,8 @@ export class IdentityOidc extends cdktf.TerraformResource { terraformResourceType: 'vault_identity_oidc', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/index.ts b/src/index.ts index 362a94f9..5819b525 100644 --- a/src/index.ts +++ b/src/index.ts @@ -106,6 +106,7 @@ export * as oktaAuthBackendUser from './okta-auth-backend-user'; export * as passwordPolicy from './password-policy'; export * as pkiSecretBackendCert from './pki-secret-backend-cert'; export * as pkiSecretBackendConfigCa from './pki-secret-backend-config-ca'; +export * as pkiSecretBackendConfigCluster from './pki-secret-backend-config-cluster'; export * as pkiSecretBackendConfigIssuers from './pki-secret-backend-config-issuers'; export * as pkiSecretBackendConfigUrls from './pki-secret-backend-config-urls'; export * as pkiSecretBackendCrlConfig from './pki-secret-backend-crl-config'; @@ -133,6 +134,7 @@ export * as secretsSyncAzureDestination from './secrets-sync-azure-destination'; export * as secretsSyncConfig from './secrets-sync-config'; export * as secretsSyncGcpDestination from './secrets-sync-gcp-destination'; export * as secretsSyncGhDestination from './secrets-sync-gh-destination'; +export * as secretsSyncGithubApps from './secrets-sync-github-apps'; export * as secretsSyncVercelDestination from './secrets-sync-vercel-destination'; export * as sshSecretBackendCa from './ssh-secret-backend-ca'; export * as sshSecretBackendRole from './ssh-secret-backend-role'; diff --git a/src/jwt-auth-backend-role/README.md b/src/jwt-auth-backend-role/README.md index f7497448..6cca2391 100644 --- a/src/jwt-auth-backend-role/README.md +++ b/src/jwt-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_jwt_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_jwt_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_jwt_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role). diff --git a/src/jwt-auth-backend-role/index.ts b/src/jwt-auth-backend-role/index.ts index 8f95e8a0..df7e140c 100644 --- a/src/jwt-auth-backend-role/index.ts +++ b/src/jwt-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,71 +15,71 @@ export interface JwtAuthBackendRoleConfig extends cdktf.TerraformMetaArguments { /** * The list of allowed values for redirect_uri during OIDC logins. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} */ readonly allowedRedirectUris?: string[]; /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} */ readonly backend?: string; /** * List of aud claims to match against. Any match is sufficient. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} */ readonly boundAudiences?: string[]; /** * Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} */ readonly boundClaims?: { [key: string]: string }; /** * How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} */ readonly boundClaimsType?: string; /** * If set, requires that the sub claim matches this value. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} */ readonly boundSubject?: string; /** * Map of claims (keys) to be copied to specified metadata fields (values). * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} */ readonly claimMappings?: { [key: string]: string }; /** * The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} */ readonly clockSkewLeeway?: number; /** * Disable bound claim value parsing. Useful when values contain commas. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} */ readonly disableBoundClaimsParsing?: boolean | cdktf.IResolvable; /** * The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} */ readonly expirationLeeway?: number; /** * The claim to use to uniquely identify the set of groups to which the user belongs; this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} */ readonly groupsClaim?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -88,115 +88,115 @@ export interface JwtAuthBackendRoleConfig extends cdktf.TerraformMetaArguments { /** * Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} */ readonly maxAge?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} */ readonly namespace?: string; /** * The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} */ readonly notBeforeLeeway?: number; /** * List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} */ readonly oidcScopes?: string[]; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} */ readonly roleName: string; /** * Type of role, either "oidc" (default) or "jwt" * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} */ readonly roleType?: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} */ readonly tokenType?: string; /** * The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} */ readonly userClaim: string; /** * Specifies if the user_claim value uses JSON pointer syntax for referencing claims. By default, the user_claim value will not use JSON pointer. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} */ readonly userClaimJsonPointer?: boolean | cdktf.IResolvable; /** * Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} */ readonly verboseOidcLogging?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role} */ export class JwtAuthBackendRole extends cdktf.TerraformResource { @@ -212,7 +212,7 @@ export class JwtAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a JwtAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the JwtAuthBackendRole to import - * @param importFromId The id of the existing JwtAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing JwtAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the JwtAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -224,7 +224,7 @@ export class JwtAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -235,8 +235,8 @@ export class JwtAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_jwt_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/jwt-auth-backend/README.md b/src/jwt-auth-backend/README.md index e03f0cc5..8fcf0de5 100644 --- a/src/jwt-auth-backend/README.md +++ b/src/jwt-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_jwt_auth_backend` -Refer to the Terraform Registry for docs: [`vault_jwt_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend). +Refer to the Terraform Registry for docs: [`vault_jwt_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend). diff --git a/src/jwt-auth-backend/index.ts b/src/jwt-auth-backend/index.ts index 77fd059b..0645c926 100644 --- a/src/jwt-auth-backend/index.ts +++ b/src/jwt-auth-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,29 +15,29 @@ export interface JwtAuthBackendConfig extends cdktf.TerraformMetaArguments { /** * The value against which to match the iss claim in a JWT * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} */ readonly boundIssuer?: string; /** * The default role to use if none is provided during login * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} */ readonly defaultRole?: string; /** * The description of the auth backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -46,135 +46,135 @@ export interface JwtAuthBackendConfig extends cdktf.TerraformMetaArguments { /** * The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} */ readonly jwksCaPem?: string; /** * JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} */ readonly jwksUrl?: string; /** * A list of supported signing algorithms. Defaults to [RS256] * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} */ readonly jwtSupportedAlgs?: string[]; /** * A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} */ readonly jwtValidationPubkeys?: string[]; /** * Specifies if the auth method is local only * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} */ readonly namespace?: string; /** * Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} */ readonly namespaceInState?: boolean | cdktf.IResolvable; /** * Client ID used for OIDC * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} */ readonly oidcClientId?: string; /** * Client Secret used for OIDC * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} */ readonly oidcClientSecret?: string; /** * The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} */ readonly oidcDiscoveryCaPem?: string; /** * The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} */ readonly oidcDiscoveryUrl?: string; /** * The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} */ readonly oidcResponseMode?: string; /** * The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} */ readonly oidcResponseTypes?: string[]; /** * path to mount the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} */ readonly path?: string; /** * Provider specific handling configuration * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} */ readonly providerConfig?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune} */ readonly tune?: JwtAuthBackendTune[] | cdktf.IResolvable; /** * Type of backend. Can be either 'jwt' or 'oidc' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} */ readonly type?: string; } export interface JwtAuthBackendTune { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers} */ readonly allowedResponseHeaders?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys} */ readonly auditNonHmacRequestKeys?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys} */ readonly auditNonHmacResponseKeys?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl} */ readonly defaultLeaseTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility} */ readonly listingVisibility?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl} */ readonly maxLeaseTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers} */ readonly passthroughRequestHeaders?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type} */ readonly tokenType?: string; } @@ -493,7 +493,7 @@ export class JwtAuthBackendTuneList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend} */ export class JwtAuthBackend extends cdktf.TerraformResource { @@ -509,7 +509,7 @@ export class JwtAuthBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a JwtAuthBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the JwtAuthBackend to import - * @param importFromId The id of the existing JwtAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing JwtAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the JwtAuthBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -521,7 +521,7 @@ export class JwtAuthBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -532,8 +532,8 @@ export class JwtAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_jwt_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kmip-secret-backend/README.md b/src/kmip-secret-backend/README.md index d3d2cf1a..0fcf0ea2 100644 --- a/src/kmip-secret-backend/README.md +++ b/src/kmip-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_kmip_secret_backend` -Refer to the Terraform Registry for docs: [`vault_kmip_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend). +Refer to the Terraform Registry for docs: [`vault_kmip_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend). diff --git a/src/kmip-secret-backend/index.ts b/src/kmip-secret-backend/index.ts index 2d469852..bc6b463a 100644 --- a/src/kmip-secret-backend/index.ts +++ b/src/kmip-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface KmipSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * Client certificate key bits, valid values depend on key type * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} */ readonly defaultTlsClientKeyBits?: number; /** * Client certificate key type, rsa or ec * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} */ readonly defaultTlsClientKeyType?: string; /** * Client certificate TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} */ readonly defaultTlsClientTtl?: number; /** * Human-friendly description of the mount for the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,55 +52,55 @@ export interface KmipSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * Addresses the KMIP server should listen on (host:port) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} */ readonly listenAddrs?: string[]; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} */ readonly namespace?: string; /** * Path where KMIP secret backend will be mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} */ readonly path: string; /** * Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} */ readonly serverHostnames?: string[]; /** * IPs to include in the server's TLS certificate as SAN IP addresses * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} */ readonly serverIps?: string[]; /** * CA key bits, valid values depend on key type * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} */ readonly tlsCaKeyBits?: number; /** * CA key type, rsa or ec * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} */ readonly tlsCaKeyType?: string; /** * Minimum TLS version to accept * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} */ readonly tlsMinVersion?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend} */ export class KmipSecretBackend extends cdktf.TerraformResource { @@ -116,7 +116,7 @@ export class KmipSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a KmipSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KmipSecretBackend to import - * @param importFromId The id of the existing KmipSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KmipSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KmipSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -128,7 +128,7 @@ export class KmipSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -139,8 +139,8 @@ export class KmipSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_kmip_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kmip-secret-role/README.md b/src/kmip-secret-role/README.md index b081b5ce..e6a3eb4c 100644 --- a/src/kmip-secret-role/README.md +++ b/src/kmip-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_kmip_secret_role` -Refer to the Terraform Registry for docs: [`vault_kmip_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role). +Refer to the Terraform Registry for docs: [`vault_kmip_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role). diff --git a/src/kmip-secret-role/index.ts b/src/kmip-secret-role/index.ts index c6615e4e..15c73d07 100644 --- a/src/kmip-secret-role/index.ts +++ b/src/kmip-secret-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface KmipSecretRoleConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#id KmipSecretRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#id KmipSecretRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,133 +22,133 @@ export interface KmipSecretRoleConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} */ readonly namespace?: string; /** * Grant permission to use the KMIP Activate operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} */ readonly operationActivate?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Add Attribute operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} */ readonly operationAddAttribute?: boolean | cdktf.IResolvable; /** * Grant all permissions to this role. May not be specified with any other operation_* params * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} */ readonly operationAll?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Create operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} */ readonly operationCreate?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Destroy operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} */ readonly operationDestroy?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Discover Version operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} */ readonly operationDiscoverVersions?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Get operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} */ readonly operationGet?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Get Attribute List operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} */ readonly operationGetAttributeList?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Get Attributes operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} */ readonly operationGetAttributes?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Locate operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} */ readonly operationLocate?: boolean | cdktf.IResolvable; /** * Remove all permissions from this role. May not be specified with any other operation_* params * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} */ readonly operationNone?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Register operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} */ readonly operationRegister?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Rekey operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} */ readonly operationRekey?: boolean | cdktf.IResolvable; /** * Grant permission to use the KMIP Revoke operation * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} */ readonly operationRevoke?: boolean | cdktf.IResolvable; /** * Path where KMIP backend is mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} */ readonly path: string; /** * Name of the role * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} */ readonly role: string; /** * Name of the scope * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} */ readonly scope: string; /** * Client certificate key bits, valid values depend on key type * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} */ readonly tlsClientKeyBits?: number; /** * Client certificate key type, rsa or ec * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} */ readonly tlsClientKeyType?: string; /** * Client certificate TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} */ readonly tlsClientTtl?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role vault_kmip_secret_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role vault_kmip_secret_role} */ export class KmipSecretRole extends cdktf.TerraformResource { @@ -164,7 +164,7 @@ export class KmipSecretRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a KmipSecretRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KmipSecretRole to import - * @param importFromId The id of the existing KmipSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KmipSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KmipSecretRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -176,7 +176,7 @@ export class KmipSecretRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_role vault_kmip_secret_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_role vault_kmip_secret_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -187,8 +187,8 @@ export class KmipSecretRole extends cdktf.TerraformResource { terraformResourceType: 'vault_kmip_secret_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kmip-secret-scope/README.md b/src/kmip-secret-scope/README.md index 6c1fea6d..b0b8a798 100644 --- a/src/kmip-secret-scope/README.md +++ b/src/kmip-secret-scope/README.md @@ -1,3 +1,3 @@ # `vault_kmip_secret_scope` -Refer to the Terraform Registry for docs: [`vault_kmip_secret_scope`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope). +Refer to the Terraform Registry for docs: [`vault_kmip_secret_scope`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope). diff --git a/src/kmip-secret-scope/index.ts b/src/kmip-secret-scope/index.ts index ddf870c7..fa4ea386 100644 --- a/src/kmip-secret-scope/index.ts +++ b/src/kmip-secret-scope/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface KmipSecretScopeConfig extends cdktf.TerraformMetaArguments { /** * Force deletion even if there are managed objects in the scope * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} */ readonly force?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface KmipSecretScopeConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} */ readonly namespace?: string; /** * Path where KMIP backend is mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} */ readonly path: string; /** * Name of the scope * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} */ readonly scope: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope} */ export class KmipSecretScope extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class KmipSecretScope extends cdktf.TerraformResource { * Generates CDKTF code for importing a KmipSecretScope resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KmipSecretScope to import - * @param importFromId The id of the existing KmipSecretScope that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KmipSecretScope that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KmipSecretScope to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class KmipSecretScope extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class KmipSecretScope extends cdktf.TerraformResource { terraformResourceType: 'vault_kmip_secret_scope', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kubernetes-auth-backend-config/README.md b/src/kubernetes-auth-backend-config/README.md index 75cab27c..1cc30e5b 100644 --- a/src/kubernetes-auth-backend-config/README.md +++ b/src/kubernetes-auth-backend-config/README.md @@ -1,3 +1,3 @@ # `vault_kubernetes_auth_backend_config` -Refer to the Terraform Registry for docs: [`vault_kubernetes_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config). +Refer to the Terraform Registry for docs: [`vault_kubernetes_auth_backend_config`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config). diff --git a/src/kubernetes-auth-backend-config/index.ts b/src/kubernetes-auth-backend-config/index.ts index 51e10acb..13c35471 100644 --- a/src/kubernetes-auth-backend-config/index.ts +++ b/src/kubernetes-auth-backend-config/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface KubernetesAuthBackendConfigConfig extends cdktf.TerraformMetaAr /** * Unique name of the kubernetes backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} */ readonly backend?: string; /** * Optional disable JWT issuer validation. Allows to skip ISS validation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} */ readonly disableIssValidation?: boolean | cdktf.IResolvable; /** * Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} */ readonly disableLocalCaJwt?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,43 +40,43 @@ export interface KubernetesAuthBackendConfigConfig extends cdktf.TerraformMetaAr /** * Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} */ readonly issuer?: string; /** * PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} */ readonly kubernetesCaCert?: string; /** * Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} */ readonly kubernetesHost: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} */ readonly namespace?: string; /** * Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} */ readonly pemKeys?: string[]; /** * A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} */ readonly tokenReviewerJwt?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config} */ export class KubernetesAuthBackendConfig extends cdktf.TerraformResource { @@ -92,7 +92,7 @@ export class KubernetesAuthBackendConfig extends cdktf.TerraformResource { * Generates CDKTF code for importing a KubernetesAuthBackendConfig resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KubernetesAuthBackendConfig to import - * @param importFromId The id of the existing KubernetesAuthBackendConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KubernetesAuthBackendConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KubernetesAuthBackendConfig to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -104,7 +104,7 @@ export class KubernetesAuthBackendConfig extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -115,8 +115,8 @@ export class KubernetesAuthBackendConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_kubernetes_auth_backend_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kubernetes-auth-backend-role/README.md b/src/kubernetes-auth-backend-role/README.md index 7d57ade7..9e39fa0c 100644 --- a/src/kubernetes-auth-backend-role/README.md +++ b/src/kubernetes-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_kubernetes_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_kubernetes_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_kubernetes_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role). diff --git a/src/kubernetes-auth-backend-role/index.ts b/src/kubernetes-auth-backend-role/index.ts index e607cf16..985e74cc 100644 --- a/src/kubernetes-auth-backend-role/index.ts +++ b/src/kubernetes-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface KubernetesAuthBackendRoleConfig extends cdktf.TerraformMetaArgu /** * Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} */ readonly aliasNameSource?: string; /** * Optional Audience claim to verify in the JWT. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} */ readonly audience?: string; /** * Unique name of the kubernetes backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} */ readonly backend?: string; /** * List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} */ readonly boundServiceAccountNames: string[]; /** * List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} */ readonly boundServiceAccountNamespaces: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,73 +52,73 @@ export interface KubernetesAuthBackendRoleConfig extends cdktf.TerraformMetaArgu /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} */ readonly roleName: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role} */ export class KubernetesAuthBackendRole extends cdktf.TerraformResource { @@ -134,7 +134,7 @@ export class KubernetesAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a KubernetesAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KubernetesAuthBackendRole to import - * @param importFromId The id of the existing KubernetesAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KubernetesAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KubernetesAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -146,7 +146,7 @@ export class KubernetesAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -157,8 +157,8 @@ export class KubernetesAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_kubernetes_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kubernetes-secret-backend-role/README.md b/src/kubernetes-secret-backend-role/README.md index 055e5c7c..290aa594 100644 --- a/src/kubernetes-secret-backend-role/README.md +++ b/src/kubernetes-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_kubernetes_secret_backend_role` -Refer to the Terraform Registry for docs: [`vault_kubernetes_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_kubernetes_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role). diff --git a/src/kubernetes-secret-backend-role/index.ts b/src/kubernetes-secret-backend-role/index.ts index 1a2488dd..0ccd6855 100644 --- a/src/kubernetes-secret-backend-role/index.ts +++ b/src/kubernetes-secret-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface KubernetesSecretBackendRoleConfig extends cdktf.TerraformMetaAr /** * The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} */ readonly allowedKubernetesNamespaces: string[]; /** * The mount path for the Kubernetes secrets engine. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} */ readonly backend: string; /** * Additional annotations to apply to all generated Kubernetes objects. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} */ readonly extraAnnotations?: { [key: string]: string }; /** * Additional labels to apply to all generated Kubernetes objects. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} */ readonly extraLabels?: { [key: string]: string }; /** * The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} */ readonly generatedRoleRules?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,55 +52,55 @@ export interface KubernetesSecretBackendRoleConfig extends cdktf.TerraformMetaAr /** * The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} */ readonly kubernetesRoleName?: string; /** * Specifies whether the Kubernetes role is a Role or ClusterRole. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} */ readonly kubernetesRoleType?: string; /** * The name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} */ readonly name: string; /** * The name template to use when generating service accounts, roles and role bindings. If unset, a default template is used. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} */ readonly nameTemplate?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} */ readonly namespace?: string; /** * The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} */ readonly serviceAccountName?: string; /** * The default TTL for generated Kubernetes tokens in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} */ readonly tokenDefaultTtl?: number; /** * The maximum TTL for generated Kubernetes tokens in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role} */ export class KubernetesSecretBackendRole extends cdktf.TerraformResource { @@ -116,7 +116,7 @@ export class KubernetesSecretBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a KubernetesSecretBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KubernetesSecretBackendRole to import - * @param importFromId The id of the existing KubernetesSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KubernetesSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KubernetesSecretBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -128,7 +128,7 @@ export class KubernetesSecretBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -139,8 +139,8 @@ export class KubernetesSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_kubernetes_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kubernetes-secret-backend/README.md b/src/kubernetes-secret-backend/README.md index fc641177..fa23d1a7 100644 --- a/src/kubernetes-secret-backend/README.md +++ b/src/kubernetes-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_kubernetes_secret_backend` -Refer to the Terraform Registry for docs: [`vault_kubernetes_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend). +Refer to the Terraform Registry for docs: [`vault_kubernetes_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend). diff --git a/src/kubernetes-secret-backend/index.ts b/src/kubernetes-secret-backend/index.ts index 3bac16cf..8c66c564 100644 --- a/src/kubernetes-secret-backend/index.ts +++ b/src/kubernetes-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,47 +15,47 @@ export interface KubernetesSecretBackendConfig extends cdktf.TerraformMetaArgume /** * List of managed key registry entry names that the mount in question is allowed to access * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} */ readonly allowedManagedKeys?: string[]; /** * Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} */ readonly auditNonHmacRequestKeys?: string[]; /** * Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} */ readonly auditNonHmacResponseKeys?: string[]; /** * Default lease duration for tokens and secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} */ readonly description?: string; /** * Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} */ readonly disableLocalCaJwt?: boolean | cdktf.IResolvable; /** * Enable the secrets engine to access Vault's external entropy source * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} */ readonly externalEntropyAccess?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -64,61 +64,61 @@ export interface KubernetesSecretBackendConfig extends cdktf.TerraformMetaArgume /** * A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. Defaults to the local pod’s CA if found, or otherwise the host's root CA set. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} */ readonly kubernetesCaCert?: string; /** * The Kubernetes API URL to connect to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} */ readonly kubernetesHost?: string; /** * Local mount flag that can be explicitly set to true to enforce local mount in HA environment * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum possible lease duration for tokens and secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} */ readonly namespace?: string; /** * Specifies mount type specific options that are passed to the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} */ readonly options?: { [key: string]: string }; /** * Where the secret backend will be mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} */ readonly path: string; /** * Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} */ readonly sealWrap?: boolean | cdktf.IResolvable; /** * The JSON web token of the service account used by the secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if found. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} */ readonly serviceAccountJwt?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend} */ export class KubernetesSecretBackend extends cdktf.TerraformResource { @@ -134,7 +134,7 @@ export class KubernetesSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a KubernetesSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KubernetesSecretBackend to import - * @param importFromId The id of the existing KubernetesSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KubernetesSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KubernetesSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -146,7 +146,7 @@ export class KubernetesSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -157,8 +157,8 @@ export class KubernetesSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_kubernetes_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kv-secret-backend-v2/README.md b/src/kv-secret-backend-v2/README.md index a30be3bf..00686d8b 100644 --- a/src/kv-secret-backend-v2/README.md +++ b/src/kv-secret-backend-v2/README.md @@ -1,3 +1,3 @@ # `vault_kv_secret_backend_v2` -Refer to the Terraform Registry for docs: [`vault_kv_secret_backend_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2). +Refer to the Terraform Registry for docs: [`vault_kv_secret_backend_v2`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2). diff --git a/src/kv-secret-backend-v2/index.ts b/src/kv-secret-backend-v2/index.ts index 463de061..a87ec6e8 100644 --- a/src/kv-secret-backend-v2/index.ts +++ b/src/kv-secret-backend-v2/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2 +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2 // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface KvSecretBackendV2Config extends cdktf.TerraformMetaArguments { /** * If true, all keys will require the cas parameter to be set on all write requests. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} */ readonly casRequired?: boolean | cdktf.IResolvable; /** * If set, specifies the length of time before a version is deleted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} */ readonly deleteVersionAfter?: number; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,25 +34,25 @@ export interface KvSecretBackendV2Config extends cdktf.TerraformMetaArguments { /** * The number of versions to keep per key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} */ readonly maxVersions?: number; /** * Path where KV-V2 engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} */ readonly mount: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2} */ export class KvSecretBackendV2 extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class KvSecretBackendV2 extends cdktf.TerraformResource { * Generates CDKTF code for importing a KvSecretBackendV2 resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KvSecretBackendV2 to import - * @param importFromId The id of the existing KvSecretBackendV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KvSecretBackendV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KvSecretBackendV2 to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class KvSecretBackendV2 extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class KvSecretBackendV2 extends cdktf.TerraformResource { terraformResourceType: 'vault_kv_secret_backend_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kv-secret-v2/README.md b/src/kv-secret-v2/README.md index 1f5d3e98..83dcc479 100644 --- a/src/kv-secret-v2/README.md +++ b/src/kv-secret-v2/README.md @@ -1,3 +1,3 @@ # `vault_kv_secret_v2` -Refer to the Terraform Registry for docs: [`vault_kv_secret_v2`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2). +Refer to the Terraform Registry for docs: [`vault_kv_secret_v2`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2). diff --git a/src/kv-secret-v2/index.ts b/src/kv-secret-v2/index.ts index 65e0bc04..05a91e03 100644 --- a/src/kv-secret-v2/index.ts +++ b/src/kv-secret-v2/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2 +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2 // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,29 +15,29 @@ export interface KvSecretV2Config extends cdktf.TerraformMetaArguments { /** * This flag is required if cas_required is set to true on either the secret or the engine's config. In order for a write to be successful, cas must be set to the current version of the secret. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} */ readonly cas?: number; /** * JSON-encoded secret data to write. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} */ readonly dataJson: string; /** * If set to true, permanently deletes all versions for the specified key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} */ readonly deleteAllVersions?: boolean | cdktf.IResolvable; /** * If set to true, disables reading secret from Vault; note: drift won't be detected. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} */ readonly disableRead?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#id KvSecretV2#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#id KvSecretV2#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -46,31 +46,31 @@ export interface KvSecretV2Config extends cdktf.TerraformMetaArguments { /** * Path where KV-V2 engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} */ readonly mount: string; /** * Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#name KvSecretV2#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#name KvSecretV2#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} */ readonly namespace?: string; /** * An object that holds option settings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#options KvSecretV2#options} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#options KvSecretV2#options} */ readonly options?: { [key: string]: string }; /** * custom_metadata block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} */ readonly customMetadata?: KvSecretV2CustomMetadata; } @@ -78,25 +78,25 @@ export interface KvSecretV2CustomMetadata { /** * If true, all keys will require the cas parameter to be set on all write requests. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} */ readonly casRequired?: boolean | cdktf.IResolvable; /** * A map of arbitrary string to string valued user-provided metadata meant to describe the secret. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#data KvSecretV2#data} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#data KvSecretV2#data} */ readonly data?: { [key: string]: string }; /** * If set, specifies the length of time before a version is deleted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} */ readonly deleteVersionAfter?: number; /** * The number of versions to keep per key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} */ readonly maxVersions?: number; } @@ -267,7 +267,7 @@ export class KvSecretV2CustomMetadataOutputReference extends cdktf.ComplexObject } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2 vault_kv_secret_v2} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2 vault_kv_secret_v2} */ export class KvSecretV2 extends cdktf.TerraformResource { @@ -283,7 +283,7 @@ export class KvSecretV2 extends cdktf.TerraformResource { * Generates CDKTF code for importing a KvSecretV2 resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KvSecretV2 to import - * @param importFromId The id of the existing KvSecretV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KvSecretV2 that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KvSecretV2 to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -295,7 +295,7 @@ export class KvSecretV2 extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret_v2 vault_kv_secret_v2} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret_v2 vault_kv_secret_v2} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -306,8 +306,8 @@ export class KvSecretV2 extends cdktf.TerraformResource { terraformResourceType: 'vault_kv_secret_v2', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/kv-secret/README.md b/src/kv-secret/README.md index 3c59c7c0..0d5cc633 100644 --- a/src/kv-secret/README.md +++ b/src/kv-secret/README.md @@ -1,3 +1,3 @@ # `vault_kv_secret` -Refer to the Terraform Registry for docs: [`vault_kv_secret`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret). +Refer to the Terraform Registry for docs: [`vault_kv_secret`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret). diff --git a/src/kv-secret/index.ts b/src/kv-secret/index.ts index 3ca7dc09..a5e26ab1 100644 --- a/src/kv-secret/index.ts +++ b/src/kv-secret/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface KvSecretConfig extends cdktf.TerraformMetaArguments { /** * JSON-encoded secret data to write. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#data_json KvSecret#data_json} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#data_json KvSecret#data_json} */ readonly dataJson: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#id KvSecret#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#id KvSecret#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface KvSecretConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#namespace KvSecret#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#namespace KvSecret#namespace} */ readonly namespace?: string; /** * Full path of the KV-V1 secret. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#path KvSecret#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#path KvSecret#path} */ readonly path: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret vault_kv_secret} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret vault_kv_secret} */ export class KvSecret extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class KvSecret extends cdktf.TerraformResource { * Generates CDKTF code for importing a KvSecret resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KvSecret to import - * @param importFromId The id of the existing KvSecret that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing KvSecret that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KvSecret to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class KvSecret extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/kv_secret vault_kv_secret} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/kv_secret vault_kv_secret} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class KvSecret extends cdktf.TerraformResource { terraformResourceType: 'vault_kv_secret', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/lazy-index.ts b/src/lazy-index.ts index f458b65f..bdce4513 100644 --- a/src/lazy-index.ts +++ b/src/lazy-index.ts @@ -106,6 +106,7 @@ Object.defineProperty(exports, 'oktaAuthBackendUser', { get: function () { retur Object.defineProperty(exports, 'passwordPolicy', { get: function () { return require('./password-policy'); } }); Object.defineProperty(exports, 'pkiSecretBackendCert', { get: function () { return require('./pki-secret-backend-cert'); } }); Object.defineProperty(exports, 'pkiSecretBackendConfigCa', { get: function () { return require('./pki-secret-backend-config-ca'); } }); +Object.defineProperty(exports, 'pkiSecretBackendConfigCluster', { get: function () { return require('./pki-secret-backend-config-cluster'); } }); Object.defineProperty(exports, 'pkiSecretBackendConfigIssuers', { get: function () { return require('./pki-secret-backend-config-issuers'); } }); Object.defineProperty(exports, 'pkiSecretBackendConfigUrls', { get: function () { return require('./pki-secret-backend-config-urls'); } }); Object.defineProperty(exports, 'pkiSecretBackendCrlConfig', { get: function () { return require('./pki-secret-backend-crl-config'); } }); @@ -133,6 +134,7 @@ Object.defineProperty(exports, 'secretsSyncAzureDestination', { get: function () Object.defineProperty(exports, 'secretsSyncConfig', { get: function () { return require('./secrets-sync-config'); } }); Object.defineProperty(exports, 'secretsSyncGcpDestination', { get: function () { return require('./secrets-sync-gcp-destination'); } }); Object.defineProperty(exports, 'secretsSyncGhDestination', { get: function () { return require('./secrets-sync-gh-destination'); } }); +Object.defineProperty(exports, 'secretsSyncGithubApps', { get: function () { return require('./secrets-sync-github-apps'); } }); Object.defineProperty(exports, 'secretsSyncVercelDestination', { get: function () { return require('./secrets-sync-vercel-destination'); } }); Object.defineProperty(exports, 'sshSecretBackendCa', { get: function () { return require('./ssh-secret-backend-ca'); } }); Object.defineProperty(exports, 'sshSecretBackendRole', { get: function () { return require('./ssh-secret-backend-role'); } }); diff --git a/src/ldap-auth-backend-group/README.md b/src/ldap-auth-backend-group/README.md index ac3b64cb..83480e26 100644 --- a/src/ldap-auth-backend-group/README.md +++ b/src/ldap-auth-backend-group/README.md @@ -1,3 +1,3 @@ # `vault_ldap_auth_backend_group` -Refer to the Terraform Registry for docs: [`vault_ldap_auth_backend_group`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group). +Refer to the Terraform Registry for docs: [`vault_ldap_auth_backend_group`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group). diff --git a/src/ldap-auth-backend-group/index.ts b/src/ldap-auth-backend-group/index.ts index 53994acd..f88d54fe 100644 --- a/src/ldap-auth-backend-group/index.ts +++ b/src/ldap-auth-backend-group/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,15 +13,15 @@ import * as cdktf from 'cdktf'; export interface LdapAuthBackendGroupConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname} */ readonly groupname: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -30,17 +30,17 @@ export interface LdapAuthBackendGroupConfig extends cdktf.TerraformMetaArguments /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} */ readonly namespace?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies} */ readonly policies?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group} */ export class LdapAuthBackendGroup extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class LdapAuthBackendGroup extends cdktf.TerraformResource { * Generates CDKTF code for importing a LdapAuthBackendGroup resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the LdapAuthBackendGroup to import - * @param importFromId The id of the existing LdapAuthBackendGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing LdapAuthBackendGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the LdapAuthBackendGroup to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class LdapAuthBackendGroup extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class LdapAuthBackendGroup extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_auth_backend_group', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/ldap-auth-backend-user/README.md b/src/ldap-auth-backend-user/README.md index 80a57f2c..1363d131 100644 --- a/src/ldap-auth-backend-user/README.md +++ b/src/ldap-auth-backend-user/README.md @@ -1,3 +1,3 @@ # `vault_ldap_auth_backend_user` -Refer to the Terraform Registry for docs: [`vault_ldap_auth_backend_user`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user). +Refer to the Terraform Registry for docs: [`vault_ldap_auth_backend_user`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user). diff --git a/src/ldap-auth-backend-user/index.ts b/src/ldap-auth-backend-user/index.ts index cd4fae58..e6329bc9 100644 --- a/src/ldap-auth-backend-user/index.ts +++ b/src/ldap-auth-backend-user/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,15 +13,15 @@ import * as cdktf from 'cdktf'; export interface LdapAuthBackendUserConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups} */ readonly groups?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -30,21 +30,21 @@ export interface LdapAuthBackendUserConfig extends cdktf.TerraformMetaArguments /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} */ readonly namespace?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies} */ readonly policies?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username} */ readonly username: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user} */ export class LdapAuthBackendUser extends cdktf.TerraformResource { @@ -60,7 +60,7 @@ export class LdapAuthBackendUser extends cdktf.TerraformResource { * Generates CDKTF code for importing a LdapAuthBackendUser resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the LdapAuthBackendUser to import - * @param importFromId The id of the existing LdapAuthBackendUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing LdapAuthBackendUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the LdapAuthBackendUser to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -72,7 +72,7 @@ export class LdapAuthBackendUser extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -83,8 +83,8 @@ export class LdapAuthBackendUser extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_auth_backend_user', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/ldap-auth-backend/README.md b/src/ldap-auth-backend/README.md index cfa803d2..bd36af36 100644 --- a/src/ldap-auth-backend/README.md +++ b/src/ldap-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_ldap_auth_backend` -Refer to the Terraform Registry for docs: [`vault_ldap_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend). +Refer to the Terraform Registry for docs: [`vault_ldap_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend). diff --git a/src/ldap-auth-backend/index.ts b/src/ldap-auth-backend/index.ts index a5ac361b..edcf5375 100644 --- a/src/ldap-auth-backend/index.ts +++ b/src/ldap-auth-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,190 +13,190 @@ import * as cdktf from 'cdktf'; export interface LdapAuthBackendConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn} */ readonly binddn?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass} */ readonly bindpass?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names} */ readonly caseSensitiveNames?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate} */ readonly certificate?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert} */ readonly clientTlsCert?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key} */ readonly clientTlsKey?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind} */ readonly denyNullBind?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn} */ readonly discoverdn?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr} */ readonly groupattr?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn} */ readonly groupdn?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter} */ readonly groupfilter?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. */ readonly id?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** * Specifies if the auth method is local only * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size} */ readonly maxPageSize?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} */ readonly namespace?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path} */ readonly path?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls} */ readonly starttls?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version} */ readonly tlsMaxVersion?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version} */ readonly tlsMinVersion?: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} */ readonly tokenType?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain} */ readonly upndomain?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url} */ readonly url: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups} */ readonly useTokenGroups?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr} */ readonly userattr?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn} */ readonly userdn?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter} */ readonly userfilter?: string; /** * Force the auth method to use the username passed by the user as the alias name. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} */ readonly usernameAsAlias?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend} */ export class LdapAuthBackend extends cdktf.TerraformResource { @@ -212,7 +212,7 @@ export class LdapAuthBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a LdapAuthBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the LdapAuthBackend to import - * @param importFromId The id of the existing LdapAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing LdapAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the LdapAuthBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -224,7 +224,7 @@ export class LdapAuthBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -235,8 +235,8 @@ export class LdapAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/ldap-secret-backend-dynamic-role/README.md b/src/ldap-secret-backend-dynamic-role/README.md index 54d9bbea..c35ef6fa 100644 --- a/src/ldap-secret-backend-dynamic-role/README.md +++ b/src/ldap-secret-backend-dynamic-role/README.md @@ -1,3 +1,3 @@ # `vault_ldap_secret_backend_dynamic_role` -Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend_dynamic_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role). +Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend_dynamic_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role). diff --git a/src/ldap-secret-backend-dynamic-role/index.ts b/src/ldap-secret-backend-dynamic-role/index.ts index 5cfdda2b..8b0f0620 100644 --- a/src/ldap-secret-backend-dynamic-role/index.ts +++ b/src/ldap-secret-backend-dynamic-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface LdapSecretBackendDynamicRoleConfig extends cdktf.TerraformMetaA /** * A templatized LDIF string used to create a user account. May contain multiple entries. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} */ readonly creationLdif: string; /** * Specifies the TTL for the leases associated with this role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} */ readonly defaultTtl?: number; /** * A templatized LDIF string used to delete the user account once its TTL has expired. This may contain multiple LDIF entries. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} */ readonly deletionLdif: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,43 +40,43 @@ export interface LdapSecretBackendDynamicRoleConfig extends cdktf.TerraformMetaA /** * Specifies the maximum TTL for the leases associated with this role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} */ readonly maxTtl?: number; /** * The path where the LDAP secrets backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} */ readonly mount?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} */ readonly roleName: string; /** * A templatized LDIF string used to attempt to rollback any changes in the event that execution of the creation_ldif results in an error. This may contain multiple LDIF entries. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} */ readonly rollbackLdif?: string; /** * A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} */ readonly usernameTemplate?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role} */ export class LdapSecretBackendDynamicRole extends cdktf.TerraformResource { @@ -92,7 +92,7 @@ export class LdapSecretBackendDynamicRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a LdapSecretBackendDynamicRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the LdapSecretBackendDynamicRole to import - * @param importFromId The id of the existing LdapSecretBackendDynamicRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing LdapSecretBackendDynamicRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the LdapSecretBackendDynamicRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -104,7 +104,7 @@ export class LdapSecretBackendDynamicRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -115,8 +115,8 @@ export class LdapSecretBackendDynamicRole extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_secret_backend_dynamic_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/ldap-secret-backend-library-set/README.md b/src/ldap-secret-backend-library-set/README.md index 3e1f53e6..3f361bb7 100644 --- a/src/ldap-secret-backend-library-set/README.md +++ b/src/ldap-secret-backend-library-set/README.md @@ -1,3 +1,3 @@ # `vault_ldap_secret_backend_library_set` -Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend_library_set`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set). +Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend_library_set`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set). diff --git a/src/ldap-secret-backend-library-set/index.ts b/src/ldap-secret-backend-library-set/index.ts index 898b5699..ead63831 100644 --- a/src/ldap-secret-backend-library-set/index.ts +++ b/src/ldap-secret-backend-library-set/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface LdapSecretBackendLibrarySetConfig extends cdktf.TerraformMetaAr /** * Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} */ readonly disableCheckInEnforcement?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,43 +28,43 @@ export interface LdapSecretBackendLibrarySetConfig extends cdktf.TerraformMetaAr /** * The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. Defaults to 24 hours. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} */ readonly maxTtl?: number; /** * The path where the LDAP secrets backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} */ readonly mount?: string; /** * The name of the set of service accounts. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} */ readonly namespace?: string; /** * The names of all the service accounts that can be checked out from this set. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} */ readonly serviceAccountNames: string[]; /** * The maximum amount of time a single check-out lasts before Vault automatically checks it back in. Defaults to 24 hours. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} */ readonly ttl?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set} */ export class LdapSecretBackendLibrarySet extends cdktf.TerraformResource { @@ -80,7 +80,7 @@ export class LdapSecretBackendLibrarySet extends cdktf.TerraformResource { * Generates CDKTF code for importing a LdapSecretBackendLibrarySet resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the LdapSecretBackendLibrarySet to import - * @param importFromId The id of the existing LdapSecretBackendLibrarySet that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing LdapSecretBackendLibrarySet that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the LdapSecretBackendLibrarySet to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +92,7 @@ export class LdapSecretBackendLibrarySet extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +103,8 @@ export class LdapSecretBackendLibrarySet extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_secret_backend_library_set', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/ldap-secret-backend-static-role/README.md b/src/ldap-secret-backend-static-role/README.md index 598dd52b..c66b7a33 100644 --- a/src/ldap-secret-backend-static-role/README.md +++ b/src/ldap-secret-backend-static-role/README.md @@ -1,3 +1,3 @@ # `vault_ldap_secret_backend_static_role` -Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role). +Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend_static_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role). diff --git a/src/ldap-secret-backend-static-role/index.ts b/src/ldap-secret-backend-static-role/index.ts index 237c1f01..aa8a19b2 100644 --- a/src/ldap-secret-backend-static-role/index.ts +++ b/src/ldap-secret-backend-static-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface LdapSecretBackendStaticRoleConfig extends cdktf.TerraformMetaAr /** * Distinguished name (DN) of the existing LDAP entry to manage password rotation for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} */ readonly dn?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,37 +28,43 @@ export interface LdapSecretBackendStaticRoleConfig extends cdktf.TerraformMetaAr /** * The path where the LDAP secrets backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} */ readonly mount?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} */ readonly roleName: string; /** * How often Vault should rotate the password of the user entry. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} */ readonly rotationPeriod: number; /** + * Skip rotation of the password on import. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} + */ + readonly skipImportRotation?: boolean | cdktf.IResolvable; + /** * The username of the existing LDAP entry to manage password rotation for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} */ readonly username: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role} */ export class LdapSecretBackendStaticRole extends cdktf.TerraformResource { @@ -74,7 +80,7 @@ export class LdapSecretBackendStaticRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a LdapSecretBackendStaticRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the LdapSecretBackendStaticRole to import - * @param importFromId The id of the existing LdapSecretBackendStaticRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing LdapSecretBackendStaticRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the LdapSecretBackendStaticRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +92,7 @@ export class LdapSecretBackendStaticRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +103,8 @@ export class LdapSecretBackendStaticRole extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_secret_backend_static_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -114,6 +120,7 @@ export class LdapSecretBackendStaticRole extends cdktf.TerraformResource { this._namespace = config.namespace; this._roleName = config.roleName; this._rotationPeriod = config.rotationPeriod; + this._skipImportRotation = config.skipImportRotation; this._username = config.username; } @@ -211,6 +218,22 @@ export class LdapSecretBackendStaticRole extends cdktf.TerraformResource { return this._rotationPeriod; } + // skip_import_rotation - computed: false, optional: true, required: false + private _skipImportRotation?: boolean | cdktf.IResolvable; + public get skipImportRotation() { + return this.getBooleanAttribute('skip_import_rotation'); + } + public set skipImportRotation(value: boolean | cdktf.IResolvable) { + this._skipImportRotation = value; + } + public resetSkipImportRotation() { + this._skipImportRotation = undefined; + } + // Temporarily expose input value. Use with caution. + public get skipImportRotationInput() { + return this._skipImportRotation; + } + // username - computed: false, optional: false, required: true private _username?: string; public get username() { @@ -236,6 +259,7 @@ export class LdapSecretBackendStaticRole extends cdktf.TerraformResource { namespace: cdktf.stringToTerraform(this._namespace), role_name: cdktf.stringToTerraform(this._roleName), rotation_period: cdktf.numberToTerraform(this._rotationPeriod), + skip_import_rotation: cdktf.booleanToTerraform(this._skipImportRotation), username: cdktf.stringToTerraform(this._username), }; } @@ -278,6 +302,12 @@ export class LdapSecretBackendStaticRole extends cdktf.TerraformResource { type: "simple", storageClassType: "number", }, + skip_import_rotation: { + value: cdktf.booleanToHclTerraform(this._skipImportRotation), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, username: { value: cdktf.stringToHclTerraform(this._username), isBlock: false, diff --git a/src/ldap-secret-backend/README.md b/src/ldap-secret-backend/README.md index 93178837..4219710a 100644 --- a/src/ldap-secret-backend/README.md +++ b/src/ldap-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_ldap_secret_backend` -Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend). +Refer to the Terraform Registry for docs: [`vault_ldap_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend). diff --git a/src/ldap-secret-backend/index.ts b/src/ldap-secret-backend/index.ts index 227f1187..b1e94434 100644 --- a/src/ldap-secret-backend/index.ts +++ b/src/ldap-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,83 +15,83 @@ export interface LdapSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * List of managed key registry entry names that the mount in question is allowed to access * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} */ readonly allowedManagedKeys?: string[]; /** * Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} */ readonly auditNonHmacRequestKeys?: string[]; /** * Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} */ readonly auditNonHmacResponseKeys?: string[]; /** * Distinguished name of object to bind when performing user and group search. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} */ readonly binddn: string; /** * LDAP password for searching for the user DN. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} */ readonly bindpass: string; /** * CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} */ readonly certificate?: string; /** * Client certificate to provide to the LDAP server, must be x509 PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} */ readonly clientTlsCert?: string; /** * Client certificate key to provide to the LDAP server, must be x509 PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} */ readonly clientTlsKey?: string; /** * Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} */ readonly connectionTimeout?: number; /** * Default lease duration for tokens and secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** * Enable the secrets engine to access Vault's external entropy source * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} */ readonly externalEntropyAccess?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -100,103 +100,103 @@ export interface LdapSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} */ readonly insecureTls?: boolean | cdktf.IResolvable; /** - * The desired length of passwords that Vault generates. - * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#length LdapSecretBackend#length} - */ - readonly length?: number; - /** * Local mount flag that can be explicitly set to true to enforce local mount in HA environment * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum possible lease duration for tokens and secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} */ readonly namespace?: string; /** * Specifies mount type specific options that are passed to the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} */ readonly options?: { [key: string]: string }; /** * Name of the password policy to use to generate passwords. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} */ readonly passwordPolicy?: string; /** * The path where the LDAP secrets backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} */ readonly path?: string; /** * Timeout, in seconds, for the connection when making requests against the server before returning back an error. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} */ readonly requestTimeout?: number; /** * The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} */ readonly schema?: string; /** * Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} */ readonly sealWrap?: boolean | cdktf.IResolvable; /** + * Skip rotation of static role secrets on import. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} + */ + readonly skipStaticRoleImportRotation?: boolean | cdktf.IResolvable; + /** * Issue a StartTLS command after establishing unencrypted connection. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} */ readonly starttls?: boolean | cdktf.IResolvable; /** * Enables userPrincipalDomain login with [username]@UPNDomain. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} */ readonly upndomain?: string; /** * LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} */ readonly url?: string; /** * Attribute used for users (default: cn) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} */ readonly userattr?: string; /** * LDAP domain to use for users (eg: ou=People,dc=example,dc=org) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} */ readonly userdn?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend} */ export class LdapSecretBackend extends cdktf.TerraformResource { @@ -212,7 +212,7 @@ export class LdapSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a LdapSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the LdapSecretBackend to import - * @param importFromId The id of the existing LdapSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing LdapSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the LdapSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -224,7 +224,7 @@ export class LdapSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -235,8 +235,8 @@ export class LdapSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_ldap_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -261,7 +261,6 @@ export class LdapSecretBackend extends cdktf.TerraformResource { this._externalEntropyAccess = config.externalEntropyAccess; this._id = config.id; this._insecureTls = config.insecureTls; - this._length = config.length; this._local = config.local; this._maxLeaseTtlSeconds = config.maxLeaseTtlSeconds; this._namespace = config.namespace; @@ -271,6 +270,7 @@ export class LdapSecretBackend extends cdktf.TerraformResource { this._requestTimeout = config.requestTimeout; this._schema = config.schema; this._sealWrap = config.sealWrap; + this._skipStaticRoleImportRotation = config.skipStaticRoleImportRotation; this._starttls = config.starttls; this._upndomain = config.upndomain; this._url = config.url; @@ -521,22 +521,6 @@ export class LdapSecretBackend extends cdktf.TerraformResource { return this._insecureTls; } - // length - computed: true, optional: true, required: false - private _length?: number; - public get length() { - return this.getNumberAttribute('length'); - } - public set length(value: number) { - this._length = value; - } - public resetLength() { - this._length = undefined; - } - // Temporarily expose input value. Use with caution. - public get lengthInput() { - return this._length; - } - // local - computed: false, optional: true, required: false private _local?: boolean | cdktf.IResolvable; public get local() { @@ -681,6 +665,22 @@ export class LdapSecretBackend extends cdktf.TerraformResource { return this._sealWrap; } + // skip_static_role_import_rotation - computed: false, optional: true, required: false + private _skipStaticRoleImportRotation?: boolean | cdktf.IResolvable; + public get skipStaticRoleImportRotation() { + return this.getBooleanAttribute('skip_static_role_import_rotation'); + } + public set skipStaticRoleImportRotation(value: boolean | cdktf.IResolvable) { + this._skipStaticRoleImportRotation = value; + } + public resetSkipStaticRoleImportRotation() { + this._skipStaticRoleImportRotation = undefined; + } + // Temporarily expose input value. Use with caution. + public get skipStaticRoleImportRotationInput() { + return this._skipStaticRoleImportRotation; + } + // starttls - computed: true, optional: true, required: false private _starttls?: boolean | cdktf.IResolvable; public get starttls() { @@ -782,7 +782,6 @@ export class LdapSecretBackend extends cdktf.TerraformResource { external_entropy_access: cdktf.booleanToTerraform(this._externalEntropyAccess), id: cdktf.stringToTerraform(this._id), insecure_tls: cdktf.booleanToTerraform(this._insecureTls), - length: cdktf.numberToTerraform(this._length), local: cdktf.booleanToTerraform(this._local), max_lease_ttl_seconds: cdktf.numberToTerraform(this._maxLeaseTtlSeconds), namespace: cdktf.stringToTerraform(this._namespace), @@ -792,6 +791,7 @@ export class LdapSecretBackend extends cdktf.TerraformResource { request_timeout: cdktf.numberToTerraform(this._requestTimeout), schema: cdktf.stringToTerraform(this._schema), seal_wrap: cdktf.booleanToTerraform(this._sealWrap), + skip_static_role_import_rotation: cdktf.booleanToTerraform(this._skipStaticRoleImportRotation), starttls: cdktf.booleanToTerraform(this._starttls), upndomain: cdktf.stringToTerraform(this._upndomain), url: cdktf.stringToTerraform(this._url), @@ -892,12 +892,6 @@ export class LdapSecretBackend extends cdktf.TerraformResource { type: "simple", storageClassType: "boolean", }, - length: { - value: cdktf.numberToHclTerraform(this._length), - isBlock: false, - type: "simple", - storageClassType: "number", - }, local: { value: cdktf.booleanToHclTerraform(this._local), isBlock: false, @@ -952,6 +946,12 @@ export class LdapSecretBackend extends cdktf.TerraformResource { type: "simple", storageClassType: "boolean", }, + skip_static_role_import_rotation: { + value: cdktf.booleanToHclTerraform(this._skipStaticRoleImportRotation), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, starttls: { value: cdktf.booleanToHclTerraform(this._starttls), isBlock: false, diff --git a/src/managed-keys/README.md b/src/managed-keys/README.md index 6764aeed..c867ee18 100644 --- a/src/managed-keys/README.md +++ b/src/managed-keys/README.md @@ -1,3 +1,3 @@ # `vault_managed_keys` -Refer to the Terraform Registry for docs: [`vault_managed_keys`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys). +Refer to the Terraform Registry for docs: [`vault_managed_keys`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys). diff --git a/src/managed-keys/index.ts b/src/managed-keys/index.ts index d21dd51a..60ffaf79 100644 --- a/src/managed-keys/index.ts +++ b/src/managed-keys/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface ManagedKeysConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#id ManagedKeys#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#id ManagedKeys#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,25 +22,25 @@ export interface ManagedKeysConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} */ readonly namespace?: string; /** * aws block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#aws ManagedKeys#aws} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#aws ManagedKeys#aws} */ readonly aws?: ManagedKeysAws[] | cdktf.IResolvable; /** * azure block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#azure ManagedKeys#azure} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#azure ManagedKeys#azure} */ readonly azure?: ManagedKeysAzure[] | cdktf.IResolvable; /** * pkcs block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} */ readonly pkcs?: ManagedKeysPkcs[] | cdktf.IResolvable; } @@ -48,79 +48,79 @@ export interface ManagedKeysAws { /** * The AWS access key to use * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} */ readonly accessKey: string; /** * If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} */ readonly allowGenerateKey?: boolean | cdktf.IResolvable; /** * Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} */ readonly allowReplaceKey?: boolean | cdktf.IResolvable; /** * Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} */ readonly allowStoreKey?: boolean | cdktf.IResolvable; /** * Allow usage from any mount point within the namespace if 'true' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} */ readonly anyMount?: boolean | cdktf.IResolvable; /** * The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} */ readonly curve?: string; /** * Used to specify a custom AWS endpoint * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} */ readonly endpoint?: string; /** * The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} */ readonly keyBits: string; /** * The type of key to use * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} */ readonly keyType: string; /** * An identifier for the key * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} */ readonly kmsKey: string; /** * A unique lowercase name that serves as identifying the key * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} */ readonly name: string; /** * The AWS region where the keys are stored (or will be stored) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#region ManagedKeys#region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#region ManagedKeys#region} */ readonly region?: string; /** * The AWS secret key to use * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} */ readonly secretKey: string; } @@ -573,85 +573,85 @@ export interface ManagedKeysAzure { /** * If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} */ readonly allowGenerateKey?: boolean | cdktf.IResolvable; /** * Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} */ readonly allowReplaceKey?: boolean | cdktf.IResolvable; /** * Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} */ readonly allowStoreKey?: boolean | cdktf.IResolvable; /** * Allow usage from any mount point within the namespace if 'true' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} */ readonly anyMount?: boolean | cdktf.IResolvable; /** * The client id for credentials to query the Azure APIs * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} */ readonly clientId: string; /** * The client secret for credentials to query the Azure APIs * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} */ readonly clientSecret: string; /** * The Azure Cloud environment API endpoints to use * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#environment ManagedKeys#environment} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#environment ManagedKeys#environment} */ readonly environment?: string; /** * The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} */ readonly keyBits?: string; /** * The Key Vault key to use for encryption and decryption * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} */ readonly keyName: string; /** * The type of key to use * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} */ readonly keyType: string; /** * A unique lowercase name that serves as identifying the key * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} */ readonly name: string; /** * The Azure Key Vault resource's DNS Suffix to connect to * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#resource ManagedKeys#resource} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#resource ManagedKeys#resource} */ readonly resource?: string; /** * The tenant id for the Azure Active Directory organization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} */ readonly tenantId: string; /** * The Key Vault vault to use the encryption keys for encryption and decryption * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} */ readonly vaultName: string; } @@ -1130,91 +1130,91 @@ export interface ManagedKeysPkcs { /** * If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} */ readonly allowGenerateKey?: boolean | cdktf.IResolvable; /** * Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} */ readonly allowReplaceKey?: boolean | cdktf.IResolvable; /** * Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} */ readonly allowStoreKey?: boolean | cdktf.IResolvable; /** * Allow usage from any mount point within the namespace if 'true' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} */ readonly anyMount?: boolean | cdktf.IResolvable; /** * Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#curve ManagedKeys#curve} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#curve ManagedKeys#curve} */ readonly curve?: string; /** * Force all operations to open up a read-write session to the HSM * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} */ readonly forceRwSession?: string; /** * Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} */ readonly keyBits?: string; /** * The id of a PKCS#11 key to use * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} */ readonly keyId: string; /** * The label of the key to use * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} */ readonly keyLabel: string; /** * The name of the kms_library stanza to use from Vault's config to lookup the local library path * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#library ManagedKeys#library} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#library ManagedKeys#library} */ readonly library: string; /** * The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} */ readonly mechanism: string; /** * A unique lowercase name that serves as identifying the key * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#name ManagedKeys#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#name ManagedKeys#name} */ readonly name: string; /** * The PIN for login * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#pin ManagedKeys#pin} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#pin ManagedKeys#pin} */ readonly pin: string; /** * The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953') * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#slot ManagedKeys#slot} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#slot ManagedKeys#slot} */ readonly slot?: string; /** * The slot token label to use * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} */ readonly tokenLabel?: string; } @@ -1723,7 +1723,7 @@ export class ManagedKeysPkcsList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys vault_managed_keys} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys vault_managed_keys} */ export class ManagedKeys extends cdktf.TerraformResource { @@ -1739,7 +1739,7 @@ export class ManagedKeys extends cdktf.TerraformResource { * Generates CDKTF code for importing a ManagedKeys resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the ManagedKeys to import - * @param importFromId The id of the existing ManagedKeys that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing ManagedKeys that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the ManagedKeys to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -1751,7 +1751,7 @@ export class ManagedKeys extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/managed_keys vault_managed_keys} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/managed_keys vault_managed_keys} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -1762,8 +1762,8 @@ export class ManagedKeys extends cdktf.TerraformResource { terraformResourceType: 'vault_managed_keys', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/mfa-duo/README.md b/src/mfa-duo/README.md index 0fe2c239..af609ec6 100644 --- a/src/mfa-duo/README.md +++ b/src/mfa-duo/README.md @@ -1,3 +1,3 @@ # `vault_mfa_duo` -Refer to the Terraform Registry for docs: [`vault_mfa_duo`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo). +Refer to the Terraform Registry for docs: [`vault_mfa_duo`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo). diff --git a/src/mfa-duo/index.ts b/src/mfa-duo/index.ts index 94c42e37..d517de1a 100644 --- a/src/mfa-duo/index.ts +++ b/src/mfa-duo/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface MfaDuoConfig extends cdktf.TerraformMetaArguments { /** * API hostname for Duo. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} */ readonly apiHostname: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#id MfaDuo#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#id MfaDuo#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,49 +28,49 @@ export interface MfaDuoConfig extends cdktf.TerraformMetaArguments { /** * Integration key for Duo. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} */ readonly integrationKey: string; /** * The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} */ readonly mountAccessor: string; /** * Name of the MFA method. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#name MfaDuo#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#name MfaDuo#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} */ readonly namespace?: string; /** * Push information for Duo. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} */ readonly pushInfo?: string; /** * Secret key for Duo. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} */ readonly secretKey: string; /** * A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} */ readonly usernameFormat?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo vault_mfa_duo} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo vault_mfa_duo} */ export class MfaDuo extends cdktf.TerraformResource { @@ -86,7 +86,7 @@ export class MfaDuo extends cdktf.TerraformResource { * Generates CDKTF code for importing a MfaDuo resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the MfaDuo to import - * @param importFromId The id of the existing MfaDuo that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing MfaDuo that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the MfaDuo to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -98,7 +98,7 @@ export class MfaDuo extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_duo vault_mfa_duo} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_duo vault_mfa_duo} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -109,8 +109,8 @@ export class MfaDuo extends cdktf.TerraformResource { terraformResourceType: 'vault_mfa_duo', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/mfa-okta/README.md b/src/mfa-okta/README.md index 2702eaf3..94571e1d 100644 --- a/src/mfa-okta/README.md +++ b/src/mfa-okta/README.md @@ -1,3 +1,3 @@ # `vault_mfa_okta` -Refer to the Terraform Registry for docs: [`vault_mfa_okta`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta). +Refer to the Terraform Registry for docs: [`vault_mfa_okta`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta). diff --git a/src/mfa-okta/index.ts b/src/mfa-okta/index.ts index c82d17a3..b2d86264 100644 --- a/src/mfa-okta/index.ts +++ b/src/mfa-okta/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,19 +15,19 @@ export interface MfaOktaConfig extends cdktf.TerraformMetaArguments { /** * Okta API key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} */ readonly apiToken: string; /** * If set, will be used as the base domain for API requests. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} */ readonly baseUrl?: string; /** * ID computed by Vault. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#id MfaOkta#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#id MfaOkta#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -36,43 +36,43 @@ export interface MfaOktaConfig extends cdktf.TerraformMetaArguments { /** * The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} */ readonly mountAccessor: string; /** * Name of the MFA method. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#name MfaOkta#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#name MfaOkta#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} */ readonly namespace?: string; /** * Name of the organization to be used in the Okta API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} */ readonly orgName: string; /** * If set to true, the username will only match the primary email for the account. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} */ readonly primaryEmail?: boolean | cdktf.IResolvable; /** * A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} */ readonly usernameFormat?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta vault_mfa_okta} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta vault_mfa_okta} */ export class MfaOkta extends cdktf.TerraformResource { @@ -88,7 +88,7 @@ export class MfaOkta extends cdktf.TerraformResource { * Generates CDKTF code for importing a MfaOkta resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the MfaOkta to import - * @param importFromId The id of the existing MfaOkta that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing MfaOkta that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the MfaOkta to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -100,7 +100,7 @@ export class MfaOkta extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_okta vault_mfa_okta} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_okta vault_mfa_okta} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -111,8 +111,8 @@ export class MfaOkta extends cdktf.TerraformResource { terraformResourceType: 'vault_mfa_okta', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/mfa-pingid/README.md b/src/mfa-pingid/README.md index 4814e3ee..ad17f31d 100644 --- a/src/mfa-pingid/README.md +++ b/src/mfa-pingid/README.md @@ -1,3 +1,3 @@ # `vault_mfa_pingid` -Refer to the Terraform Registry for docs: [`vault_mfa_pingid`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid). +Refer to the Terraform Registry for docs: [`vault_mfa_pingid`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid). diff --git a/src/mfa-pingid/index.ts b/src/mfa-pingid/index.ts index 4325bc30..c7e0d6a2 100644 --- a/src/mfa-pingid/index.ts +++ b/src/mfa-pingid/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,7 +15,7 @@ export interface MfaPingidConfig extends cdktf.TerraformMetaArguments { /** * ID computed by Vault. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#id MfaPingid#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#id MfaPingid#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -24,37 +24,37 @@ export interface MfaPingidConfig extends cdktf.TerraformMetaArguments { /** * The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} */ readonly mountAccessor: string; /** * Name of the MFA method. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#name MfaPingid#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#name MfaPingid#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} */ readonly namespace?: string; /** * A base64-encoded third-party settings file retrieved from PingID's configuration page. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} */ readonly settingsFileBase64: string; /** * A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} */ readonly usernameFormat?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid vault_mfa_pingid} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid vault_mfa_pingid} */ export class MfaPingid extends cdktf.TerraformResource { @@ -70,7 +70,7 @@ export class MfaPingid extends cdktf.TerraformResource { * Generates CDKTF code for importing a MfaPingid resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the MfaPingid to import - * @param importFromId The id of the existing MfaPingid that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing MfaPingid that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the MfaPingid to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -82,7 +82,7 @@ export class MfaPingid extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_pingid vault_mfa_pingid} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_pingid vault_mfa_pingid} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -93,8 +93,8 @@ export class MfaPingid extends cdktf.TerraformResource { terraformResourceType: 'vault_mfa_pingid', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/mfa-totp/README.md b/src/mfa-totp/README.md index 2e861d78..46f6b48f 100644 --- a/src/mfa-totp/README.md +++ b/src/mfa-totp/README.md @@ -1,3 +1,3 @@ # `vault_mfa_totp` -Refer to the Terraform Registry for docs: [`vault_mfa_totp`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp). +Refer to the Terraform Registry for docs: [`vault_mfa_totp`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp). diff --git a/src/mfa-totp/index.ts b/src/mfa-totp/index.ts index c1399843..b6a97382 100644 --- a/src/mfa-totp/index.ts +++ b/src/mfa-totp/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,19 +15,19 @@ export interface MfaTotpConfig extends cdktf.TerraformMetaArguments { /** * Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} */ readonly algorithm?: string; /** * The number of digits in the generated TOTP token. This value can either be 6 or 8. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#digits MfaTotp#digits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#digits MfaTotp#digits} */ readonly digits?: number; /** * ID computed by Vault. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#id MfaTotp#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#id MfaTotp#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -36,49 +36,49 @@ export interface MfaTotpConfig extends cdktf.TerraformMetaArguments { /** * The name of the key's issuing organization. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} */ readonly issuer: string; /** * Specifies the size in bytes of the generated key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} */ readonly keySize?: number; /** * Name of the MFA method. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#name MfaTotp#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#name MfaTotp#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} */ readonly namespace?: string; /** * The length of time used to generate a counter for the TOTP token calculation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#period MfaTotp#period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#period MfaTotp#period} */ readonly period?: number; /** * The pixel size of the generated square QR code. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} */ readonly qrSize?: number; /** * The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#skew MfaTotp#skew} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#skew MfaTotp#skew} */ readonly skew?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp vault_mfa_totp} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp vault_mfa_totp} */ export class MfaTotp extends cdktf.TerraformResource { @@ -94,7 +94,7 @@ export class MfaTotp extends cdktf.TerraformResource { * Generates CDKTF code for importing a MfaTotp resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the MfaTotp to import - * @param importFromId The id of the existing MfaTotp that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing MfaTotp that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the MfaTotp to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -106,7 +106,7 @@ export class MfaTotp extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mfa_totp vault_mfa_totp} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mfa_totp vault_mfa_totp} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -117,8 +117,8 @@ export class MfaTotp extends cdktf.TerraformResource { terraformResourceType: 'vault_mfa_totp', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/mongodbatlas-secret-backend/README.md b/src/mongodbatlas-secret-backend/README.md index 89789d09..7956fe8d 100644 --- a/src/mongodbatlas-secret-backend/README.md +++ b/src/mongodbatlas-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_mongodbatlas_secret_backend` -Refer to the Terraform Registry for docs: [`vault_mongodbatlas_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend). +Refer to the Terraform Registry for docs: [`vault_mongodbatlas_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend). diff --git a/src/mongodbatlas-secret-backend/index.ts b/src/mongodbatlas-secret-backend/index.ts index ab83fc29..038a98cd 100644 --- a/src/mongodbatlas-secret-backend/index.ts +++ b/src/mongodbatlas-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface MongodbatlasSecretBackendConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,31 +22,31 @@ export interface MongodbatlasSecretBackendConfig extends cdktf.TerraformMetaArgu /** * Path where MongoDB Atlas secret backend is mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} */ readonly mount: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} */ readonly namespace?: string; /** * The Private Programmatic API Key used to connect with MongoDB Atlas API * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} */ readonly privateKey: string; /** * The Public Programmatic API Key used to authenticate with the MongoDB Atlas API * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} */ readonly publicKey: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend} */ export class MongodbatlasSecretBackend extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class MongodbatlasSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a MongodbatlasSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the MongodbatlasSecretBackend to import - * @param importFromId The id of the existing MongodbatlasSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing MongodbatlasSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the MongodbatlasSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class MongodbatlasSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class MongodbatlasSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_mongodbatlas_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/mongodbatlas-secret-role/README.md b/src/mongodbatlas-secret-role/README.md index 8faa7b06..fd54ec3d 100644 --- a/src/mongodbatlas-secret-role/README.md +++ b/src/mongodbatlas-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_mongodbatlas_secret_role` -Refer to the Terraform Registry for docs: [`vault_mongodbatlas_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role). +Refer to the Terraform Registry for docs: [`vault_mongodbatlas_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role). diff --git a/src/mongodbatlas-secret-role/index.ts b/src/mongodbatlas-secret-role/index.ts index 48602b70..ba012dc8 100644 --- a/src/mongodbatlas-secret-role/index.ts +++ b/src/mongodbatlas-secret-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface MongodbatlasSecretRoleConfig extends cdktf.TerraformMetaArgumen /** * Whitelist entry in CIDR notation to be added for the API key * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} */ readonly cidrBlocks?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,67 +28,67 @@ export interface MongodbatlasSecretRoleConfig extends cdktf.TerraformMetaArgumen /** * IP address to be added to the whitelist for the API key * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} */ readonly ipAddresses?: string[]; /** * The maximum allowed lifetime of credentials issued using this role * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} */ readonly maxTtl?: string; /** * Path where MongoDB Atlas secret backend is mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} */ readonly mount: string; /** * Name of the role * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} */ readonly namespace?: string; /** * ID for the organization to which the target API Key belongs * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} */ readonly organizationId?: string; /** * ID for the project to which the target API Key belongs * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} */ readonly projectId?: string; /** * Roles assigned when an org API key is assigned to a project API key * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} */ readonly projectRoles?: string[]; /** * List of roles that the API Key needs to have * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} */ readonly roles: string[]; /** * Duration in seconds after which the issued credential should expire * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} */ readonly ttl?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role} */ export class MongodbatlasSecretRole extends cdktf.TerraformResource { @@ -104,7 +104,7 @@ export class MongodbatlasSecretRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a MongodbatlasSecretRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the MongodbatlasSecretRole to import - * @param importFromId The id of the existing MongodbatlasSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing MongodbatlasSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the MongodbatlasSecretRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -116,7 +116,7 @@ export class MongodbatlasSecretRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -127,8 +127,8 @@ export class MongodbatlasSecretRole extends cdktf.TerraformResource { terraformResourceType: 'vault_mongodbatlas_secret_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/mount/README.md b/src/mount/README.md index 20eee51f..148faaa3 100644 --- a/src/mount/README.md +++ b/src/mount/README.md @@ -1,3 +1,3 @@ # `vault_mount` -Refer to the Terraform Registry for docs: [`vault_mount`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount). +Refer to the Terraform Registry for docs: [`vault_mount`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount). diff --git a/src/mount/index.ts b/src/mount/index.ts index 2750a9ea..8683e52f 100644 --- a/src/mount/index.ts +++ b/src/mount/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,41 +15,41 @@ export interface MountConfig extends cdktf.TerraformMetaArguments { /** * List of managed key registry entry names that the mount in question is allowed to access * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} */ readonly allowedManagedKeys?: string[]; /** * Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} */ readonly auditNonHmacRequestKeys?: string[]; /** * Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} */ readonly auditNonHmacResponseKeys?: string[]; /** * Default lease duration for tokens and secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#description Mount#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#description Mount#description} */ readonly description?: string; /** * Enable the secrets engine to access Vault's external entropy source * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} */ readonly externalEntropyAccess?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#id Mount#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#id Mount#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -58,49 +58,49 @@ export interface MountConfig extends cdktf.TerraformMetaArguments { /** * Local mount flag that can be explicitly set to true to enforce local mount in HA environment * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#local Mount#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#local Mount#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum possible lease duration for tokens and secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#namespace Mount#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#namespace Mount#namespace} */ readonly namespace?: string; /** * Specifies mount type specific options that are passed to the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#options Mount#options} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#options Mount#options} */ readonly options?: { [key: string]: string }; /** * Where the secret backend will be mounted * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#path Mount#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#path Mount#path} */ readonly path: string; /** * Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#seal_wrap Mount#seal_wrap} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#seal_wrap Mount#seal_wrap} */ readonly sealWrap?: boolean | cdktf.IResolvable; /** * Type of the backend, such as 'aws' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#type Mount#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#type Mount#type} */ readonly type: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount vault_mount} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount vault_mount} */ export class Mount extends cdktf.TerraformResource { @@ -116,7 +116,7 @@ export class Mount extends cdktf.TerraformResource { * Generates CDKTF code for importing a Mount resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the Mount to import - * @param importFromId The id of the existing Mount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing Mount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the Mount to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -128,7 +128,7 @@ export class Mount extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/mount vault_mount} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/mount vault_mount} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -139,8 +139,8 @@ export class Mount extends cdktf.TerraformResource { terraformResourceType: 'vault_mount', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/namespace/README.md b/src/namespace/README.md index 6448bec2..e144991f 100644 --- a/src/namespace/README.md +++ b/src/namespace/README.md @@ -1,3 +1,3 @@ # `vault_namespace` -Refer to the Terraform Registry for docs: [`vault_namespace`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace). +Refer to the Terraform Registry for docs: [`vault_namespace`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace). diff --git a/src/namespace/index.ts b/src/namespace/index.ts index 6fe6d67b..c7cd8cd0 100644 --- a/src/namespace/index.ts +++ b/src/namespace/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface NamespaceConfig extends cdktf.TerraformMetaArguments { /** * Custom metadata describing this namespace. Value type is map[string]string. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} */ readonly customMetadata?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#id Namespace#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#id Namespace#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface NamespaceConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#namespace Namespace#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#namespace Namespace#namespace} */ readonly namespace?: string; /** * Namespace path. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path Namespace#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path Namespace#path} */ readonly path: string; /** * The fully qualified namespace path. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#path_fq Namespace#path_fq} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#path_fq Namespace#path_fq} */ readonly pathFq?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace vault_namespace} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace vault_namespace} */ export class Namespace extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class Namespace extends cdktf.TerraformResource { * Generates CDKTF code for importing a Namespace resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the Namespace to import - * @param importFromId The id of the existing Namespace that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing Namespace that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the Namespace to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class Namespace extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/namespace vault_namespace} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/namespace vault_namespace} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class Namespace extends cdktf.TerraformResource { terraformResourceType: 'vault_namespace', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/nomad-secret-backend/README.md b/src/nomad-secret-backend/README.md index a5ba40eb..aa253abc 100644 --- a/src/nomad-secret-backend/README.md +++ b/src/nomad-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_nomad_secret_backend` -Refer to the Terraform Registry for docs: [`vault_nomad_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend). +Refer to the Terraform Registry for docs: [`vault_nomad_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend). diff --git a/src/nomad-secret-backend/index.ts b/src/nomad-secret-backend/index.ts index 989361ee..ad51a362 100644 --- a/src/nomad-secret-backend/index.ts +++ b/src/nomad-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,53 +15,53 @@ export interface NomadSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} */ readonly address?: string; /** * The mount path for the Nomad backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} */ readonly backend?: string; /** * CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} */ readonly caCert?: string; /** * Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} */ readonly clientCert?: string; /** * Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} */ readonly clientKey?: string; /** * Default lease duration for secrets in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -70,49 +70,49 @@ export interface NomadSecretBackendConfig extends cdktf.TerraformMetaArguments { /** * Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} */ readonly local?: boolean | cdktf.IResolvable; /** * Maximum possible lease duration for secrets in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} */ readonly maxTokenNameLength?: number; /** * Maximum possible lease duration for secrets in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} */ readonly maxTtl?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} */ readonly namespace?: string; /** * Specifies the Nomad Management token to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} */ readonly token?: string; /** * Maximum possible lease duration for secrets in seconds. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} */ readonly ttl?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend} */ export class NomadSecretBackend extends cdktf.TerraformResource { @@ -128,7 +128,7 @@ export class NomadSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a NomadSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the NomadSecretBackend to import - * @param importFromId The id of the existing NomadSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing NomadSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the NomadSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -140,7 +140,7 @@ export class NomadSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -151,8 +151,8 @@ export class NomadSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_nomad_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/nomad-secret-role/README.md b/src/nomad-secret-role/README.md index 4d5f8c4a..6dc13a0a 100644 --- a/src/nomad-secret-role/README.md +++ b/src/nomad-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_nomad_secret_role` -Refer to the Terraform Registry for docs: [`vault_nomad_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role). +Refer to the Terraform Registry for docs: [`vault_nomad_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role). diff --git a/src/nomad-secret-role/index.ts b/src/nomad-secret-role/index.ts index 1fcffbc1..b8c456ac 100644 --- a/src/nomad-secret-role/index.ts +++ b/src/nomad-secret-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface NomadSecretRoleConfig extends cdktf.TerraformMetaArguments { /** * The mount path for the Nomad backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} */ readonly backend: string; /** * Specifies if the token should be global. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} */ readonly global?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#id NomadSecretRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#id NomadSecretRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,31 +34,31 @@ export interface NomadSecretRoleConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} */ readonly namespace?: string; /** * Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} */ readonly policies?: string[]; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} */ readonly role: string; /** * Specifies the type of token to create when using this role. Valid values are "client" or "management". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} */ readonly type?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role vault_nomad_secret_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role vault_nomad_secret_role} */ export class NomadSecretRole extends cdktf.TerraformResource { @@ -74,7 +74,7 @@ export class NomadSecretRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a NomadSecretRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the NomadSecretRole to import - * @param importFromId The id of the existing NomadSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing NomadSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the NomadSecretRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +86,7 @@ export class NomadSecretRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/nomad_secret_role vault_nomad_secret_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/nomad_secret_role vault_nomad_secret_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +97,8 @@ export class NomadSecretRole extends cdktf.TerraformResource { terraformResourceType: 'vault_nomad_secret_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/okta-auth-backend-group/README.md b/src/okta-auth-backend-group/README.md index 2250b50b..eb0a6da9 100644 --- a/src/okta-auth-backend-group/README.md +++ b/src/okta-auth-backend-group/README.md @@ -1,3 +1,3 @@ # `vault_okta_auth_backend_group` -Refer to the Terraform Registry for docs: [`vault_okta_auth_backend_group`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group). +Refer to the Terraform Registry for docs: [`vault_okta_auth_backend_group`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group). diff --git a/src/okta-auth-backend-group/index.ts b/src/okta-auth-backend-group/index.ts index d17397cc..eee745e1 100644 --- a/src/okta-auth-backend-group/index.ts +++ b/src/okta-auth-backend-group/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface OktaAuthBackendGroupAConfig extends cdktf.TerraformMetaArgument /** * Name of the Okta group * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} */ readonly groupName: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface OktaAuthBackendGroupAConfig extends cdktf.TerraformMetaArgument /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} */ readonly namespace?: string; /** * Path to the Okta auth backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} */ readonly path: string; /** * Policies to associate with this group * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} */ readonly policies?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group} */ export class OktaAuthBackendGroupA extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class OktaAuthBackendGroupA extends cdktf.TerraformResource { * Generates CDKTF code for importing a OktaAuthBackendGroupA resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the OktaAuthBackendGroupA to import - * @param importFromId The id of the existing OktaAuthBackendGroupA that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing OktaAuthBackendGroupA that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the OktaAuthBackendGroupA to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class OktaAuthBackendGroupA extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class OktaAuthBackendGroupA extends cdktf.TerraformResource { terraformResourceType: 'vault_okta_auth_backend_group', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/okta-auth-backend-user/README.md b/src/okta-auth-backend-user/README.md index 6c9dc7b6..1d6afba8 100644 --- a/src/okta-auth-backend-user/README.md +++ b/src/okta-auth-backend-user/README.md @@ -1,3 +1,3 @@ # `vault_okta_auth_backend_user` -Refer to the Terraform Registry for docs: [`vault_okta_auth_backend_user`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user). +Refer to the Terraform Registry for docs: [`vault_okta_auth_backend_user`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user). diff --git a/src/okta-auth-backend-user/index.ts b/src/okta-auth-backend-user/index.ts index 949ed101..1abdfa2f 100644 --- a/src/okta-auth-backend-user/index.ts +++ b/src/okta-auth-backend-user/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface OktaAuthBackendUserAConfig extends cdktf.TerraformMetaArguments /** * Groups within the Okta auth backend to associate with this user * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} */ readonly groups?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,31 +28,31 @@ export interface OktaAuthBackendUserAConfig extends cdktf.TerraformMetaArguments /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} */ readonly namespace?: string; /** * Path to the Okta auth backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} */ readonly path: string; /** * Policies to associate with this user * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} */ readonly policies?: string[]; /** * Name of the user within Okta * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} */ readonly username: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user} */ export class OktaAuthBackendUserA extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class OktaAuthBackendUserA extends cdktf.TerraformResource { * Generates CDKTF code for importing a OktaAuthBackendUserA resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the OktaAuthBackendUserA to import - * @param importFromId The id of the existing OktaAuthBackendUserA that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing OktaAuthBackendUserA that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the OktaAuthBackendUserA to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class OktaAuthBackendUserA extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class OktaAuthBackendUserA extends cdktf.TerraformResource { terraformResourceType: 'vault_okta_auth_backend_user', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/okta-auth-backend/README.md b/src/okta-auth-backend/README.md index b0994464..6f59bb65 100644 --- a/src/okta-auth-backend/README.md +++ b/src/okta-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_okta_auth_backend` -Refer to the Terraform Registry for docs: [`vault_okta_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend). +Refer to the Terraform Registry for docs: [`vault_okta_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend). diff --git a/src/okta-auth-backend/index.ts b/src/okta-auth-backend/index.ts index 6cdb3ded..be679e23 100644 --- a/src/okta-auth-backend/index.ts +++ b/src/okta-auth-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,33 +15,33 @@ export interface OktaAuthBackendConfig extends cdktf.TerraformMetaArguments { /** * The Okta url. Examples: oktapreview.com, okta.com (default) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} */ readonly baseUrl?: string; /** * When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} */ readonly bypassOktaMfa?: boolean | cdktf.IResolvable; /** * The description of the auth backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group} */ readonly group?: OktaAuthBackendGroup[] | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -50,51 +50,51 @@ export interface OktaAuthBackendConfig extends cdktf.TerraformMetaArguments { /** * Maximum duration after which authentication will be expired * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} */ readonly maxTtl?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} */ readonly namespace?: string; /** * The Okta organization. This will be the first part of the url https://XXX.okta.com. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} */ readonly organization: string; /** * path to mount the backend * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} */ readonly path?: string; /** * The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} */ readonly token?: string; /** * Duration after which authentication will be expired * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} */ readonly ttl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user} */ readonly user?: OktaAuthBackendUser[] | cdktf.IResolvable; } export interface OktaAuthBackendGroup { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name} */ readonly groupName?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies} */ readonly policies?: string[]; } @@ -239,15 +239,15 @@ export class OktaAuthBackendGroupList extends cdktf.ComplexList { } export interface OktaAuthBackendUser { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups} */ readonly groups?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies} */ readonly policies?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username} */ readonly username?: string; } @@ -421,7 +421,7 @@ export class OktaAuthBackendUserList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend vault_okta_auth_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend vault_okta_auth_backend} */ export class OktaAuthBackend extends cdktf.TerraformResource { @@ -437,7 +437,7 @@ export class OktaAuthBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a OktaAuthBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the OktaAuthBackend to import - * @param importFromId The id of the existing OktaAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing OktaAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the OktaAuthBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -449,7 +449,7 @@ export class OktaAuthBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/okta_auth_backend vault_okta_auth_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/okta_auth_backend vault_okta_auth_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -460,8 +460,8 @@ export class OktaAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_okta_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/password-policy/README.md b/src/password-policy/README.md index 22c8e909..b0c82d56 100644 --- a/src/password-policy/README.md +++ b/src/password-policy/README.md @@ -1,3 +1,3 @@ # `vault_password_policy` -Refer to the Terraform Registry for docs: [`vault_password_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy). +Refer to the Terraform Registry for docs: [`vault_password_policy`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy). diff --git a/src/password-policy/index.ts b/src/password-policy/index.ts index 98c4abaa..488cc49d 100644 --- a/src/password-policy/index.ts +++ b/src/password-policy/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface PasswordPolicyConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#id PasswordPolicy#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#id PasswordPolicy#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,25 +22,25 @@ export interface PasswordPolicyConfig extends cdktf.TerraformMetaArguments { /** * Name of the password policy. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#name PasswordPolicy#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#name PasswordPolicy#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} */ readonly namespace?: string; /** * The password policy document * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#policy PasswordPolicy#policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#policy PasswordPolicy#policy} */ readonly policy: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy vault_password_policy} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy vault_password_policy} */ export class PasswordPolicy extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class PasswordPolicy extends cdktf.TerraformResource { * Generates CDKTF code for importing a PasswordPolicy resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PasswordPolicy to import - * @param importFromId The id of the existing PasswordPolicy that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PasswordPolicy that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PasswordPolicy to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class PasswordPolicy extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/password_policy vault_password_policy} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/password_policy vault_password_policy} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class PasswordPolicy extends cdktf.TerraformResource { terraformResourceType: 'vault_password_policy', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-cert/README.md b/src/pki-secret-backend-cert/README.md index 848b0d02..f9591a2d 100644 --- a/src/pki-secret-backend-cert/README.md +++ b/src/pki-secret-backend-cert/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_cert` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_cert`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_cert`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert). diff --git a/src/pki-secret-backend-cert/index.ts b/src/pki-secret-backend-cert/index.ts index 3d197734..a26886b2 100644 --- a/src/pki-secret-backend-cert/index.ts +++ b/src/pki-secret-backend-cert/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,41 +15,41 @@ export interface PkiSecretBackendCertConfig extends cdktf.TerraformMetaArguments /** * List of alternative names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} */ readonly altNames?: string[]; /** * If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} */ readonly autoRenew?: boolean | cdktf.IResolvable; /** * The PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} */ readonly backend: string; /** * CN of the certificate to create. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} */ readonly commonName: string; /** * Flag to exclude CN from SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} */ readonly excludeCnFromSans?: boolean | cdktf.IResolvable; /** * The format of data. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} */ readonly format?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -58,73 +58,73 @@ export interface PkiSecretBackendCertConfig extends cdktf.TerraformMetaArguments /** * List of alternative IPs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} */ readonly ipSans?: string[]; /** * Specifies the default issuer of this request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} */ readonly issuerRef?: string; /** * Generate a new certificate when the expiration is within this number of seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} */ readonly minSecondsRemaining?: number; /** * Name of the role to create the certificate against. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} */ readonly namespace?: string; /** * List of other SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} */ readonly otherSans?: string[]; /** * The private key format. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} */ readonly privateKeyFormat?: string; /** * Revoke the certificate upon resource destruction. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} */ readonly revoke?: boolean | cdktf.IResolvable; /** * Time to live. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} */ readonly ttl?: string; /** * List of alternative URIs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} */ readonly uriSans?: string[]; /** * List of Subject User IDs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} */ readonly userIds?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert} */ export class PkiSecretBackendCert extends cdktf.TerraformResource { @@ -140,7 +140,7 @@ export class PkiSecretBackendCert extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendCert resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendCert to import - * @param importFromId The id of the existing PkiSecretBackendCert that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendCert that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendCert to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -152,7 +152,7 @@ export class PkiSecretBackendCert extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -163,8 +163,8 @@ export class PkiSecretBackendCert extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_cert', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-config-ca/README.md b/src/pki-secret-backend-config-ca/README.md index 178ee8b0..e44c1594 100644 --- a/src/pki-secret-backend-config-ca/README.md +++ b/src/pki-secret-backend-config-ca/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_config_ca` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_ca`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_ca`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca). diff --git a/src/pki-secret-backend-config-ca/index.ts b/src/pki-secret-backend-config-ca/index.ts index 97d3f674..51513014 100644 --- a/src/pki-secret-backend-config-ca/index.ts +++ b/src/pki-secret-backend-config-ca/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface PkiSecretBackendConfigCaConfig extends cdktf.TerraformMetaArgum /** * The PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface PkiSecretBackendConfigCaConfig extends cdktf.TerraformMetaArgum /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} */ readonly namespace?: string; /** * The key and certificate PEM bundle. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} */ readonly pemBundle: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca} */ export class PkiSecretBackendConfigCa extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class PkiSecretBackendConfigCa extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendConfigCa resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendConfigCa to import - * @param importFromId The id of the existing PkiSecretBackendConfigCa that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendConfigCa that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendConfigCa to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class PkiSecretBackendConfigCa extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class PkiSecretBackendConfigCa extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_config_ca', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-config-cluster/README.md b/src/pki-secret-backend-config-cluster/README.md new file mode 100644 index 00000000..ae40d067 --- /dev/null +++ b/src/pki-secret-backend-config-cluster/README.md @@ -0,0 +1,3 @@ +# `vault_pki_secret_backend_config_cluster` + +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_cluster`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster). diff --git a/src/pki-secret-backend-config-cluster/index.ts b/src/pki-secret-backend-config-cluster/index.ts new file mode 100644 index 00000000..50c5f164 --- /dev/null +++ b/src/pki-secret-backend-config-cluster/index.ts @@ -0,0 +1,238 @@ +/** + * Copyright (c) HashiCorp, Inc. + * SPDX-License-Identifier: MPL-2.0 + */ + +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster +// generated from terraform resource schema + +import { Construct } from 'constructs'; +import * as cdktf from 'cdktf'; + +// Configuration + +export interface PkiSecretBackendConfigClusterConfig extends cdktf.TerraformMetaArguments { + /** + * Path to the cluster's AIA distribution point. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} + */ + readonly aiaPath?: string; + /** + * Full path where PKI backend is mounted. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} + */ + readonly backend: string; + /** + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id} + * + * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. + * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + */ + readonly id?: string; + /** + * Target namespace. (requires Enterprise) + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} + */ + readonly namespace?: string; + /** + * Path to the cluster's API mount path. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} + */ + readonly path?: string; +} + +/** +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster} +*/ +export class PkiSecretBackendConfigCluster extends cdktf.TerraformResource { + + // ================= + // STATIC PROPERTIES + // ================= + public static readonly tfResourceType = "vault_pki_secret_backend_config_cluster"; + + // ============== + // STATIC Methods + // ============== + /** + * Generates CDKTF code for importing a PkiSecretBackendConfigCluster resource upon running "cdktf plan " + * @param scope The scope in which to define this construct + * @param importToId The construct id used in the generated config for the PkiSecretBackendConfigCluster to import + * @param importFromId The id of the existing PkiSecretBackendConfigCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use + * @param provider? Optional instance of the provider where the PkiSecretBackendConfigCluster to import is found + */ + public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { + return new cdktf.ImportableResource(scope, importToId, { terraformResourceType: "vault_pki_secret_backend_config_cluster", importId: importFromId, provider }); + } + + // =========== + // INITIALIZER + // =========== + + /** + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster} Resource + * + * @param scope The scope in which to define this construct + * @param id The scoped construct ID. Must be unique amongst siblings in the same scope + * @param options PkiSecretBackendConfigClusterConfig + */ + public constructor(scope: Construct, id: string, config: PkiSecretBackendConfigClusterConfig) { + super(scope, id, { + terraformResourceType: 'vault_pki_secret_backend_config_cluster', + terraformGeneratorMetadata: { + providerName: 'vault', + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' + }, + provider: config.provider, + dependsOn: config.dependsOn, + count: config.count, + lifecycle: config.lifecycle, + provisioners: config.provisioners, + connection: config.connection, + forEach: config.forEach + }); + this._aiaPath = config.aiaPath; + this._backend = config.backend; + this._id = config.id; + this._namespace = config.namespace; + this._path = config.path; + } + + // ========== + // ATTRIBUTES + // ========== + + // aia_path - computed: false, optional: true, required: false + private _aiaPath?: string; + public get aiaPath() { + return this.getStringAttribute('aia_path'); + } + public set aiaPath(value: string) { + this._aiaPath = value; + } + public resetAiaPath() { + this._aiaPath = undefined; + } + // Temporarily expose input value. Use with caution. + public get aiaPathInput() { + return this._aiaPath; + } + + // backend - computed: false, optional: false, required: true + private _backend?: string; + public get backend() { + return this.getStringAttribute('backend'); + } + public set backend(value: string) { + this._backend = value; + } + // Temporarily expose input value. Use with caution. + public get backendInput() { + return this._backend; + } + + // id - computed: true, optional: true, required: false + private _id?: string; + public get id() { + return this.getStringAttribute('id'); + } + public set id(value: string) { + this._id = value; + } + public resetId() { + this._id = undefined; + } + // Temporarily expose input value. Use with caution. + public get idInput() { + return this._id; + } + + // namespace - computed: false, optional: true, required: false + private _namespace?: string; + public get namespace() { + return this.getStringAttribute('namespace'); + } + public set namespace(value: string) { + this._namespace = value; + } + public resetNamespace() { + this._namespace = undefined; + } + // Temporarily expose input value. Use with caution. + public get namespaceInput() { + return this._namespace; + } + + // path - computed: false, optional: true, required: false + private _path?: string; + public get path() { + return this.getStringAttribute('path'); + } + public set path(value: string) { + this._path = value; + } + public resetPath() { + this._path = undefined; + } + // Temporarily expose input value. Use with caution. + public get pathInput() { + return this._path; + } + + // ========= + // SYNTHESIS + // ========= + + protected synthesizeAttributes(): { [name: string]: any } { + return { + aia_path: cdktf.stringToTerraform(this._aiaPath), + backend: cdktf.stringToTerraform(this._backend), + id: cdktf.stringToTerraform(this._id), + namespace: cdktf.stringToTerraform(this._namespace), + path: cdktf.stringToTerraform(this._path), + }; + } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + aia_path: { + value: cdktf.stringToHclTerraform(this._aiaPath), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + backend: { + value: cdktf.stringToHclTerraform(this._backend), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + path: { + value: cdktf.stringToHclTerraform(this._path), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } +} diff --git a/src/pki-secret-backend-config-issuers/README.md b/src/pki-secret-backend-config-issuers/README.md index 292aebc1..4f50d957 100644 --- a/src/pki-secret-backend-config-issuers/README.md +++ b/src/pki-secret-backend-config-issuers/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_config_issuers` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_issuers`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_issuers`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers). diff --git a/src/pki-secret-backend-config-issuers/index.ts b/src/pki-secret-backend-config-issuers/index.ts index 86731c53..73a8598f 100644 --- a/src/pki-secret-backend-config-issuers/index.ts +++ b/src/pki-secret-backend-config-issuers/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface PkiSecretBackendConfigIssuersConfig extends cdktf.TerraformMeta /** * Full path where PKI backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#backend PkiSecretBackendConfigIssuers#backend} */ readonly backend: string; /** * Specifies the default issuer by ID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default PkiSecretBackendConfigIssuers#default} */ readonly default?: string; /** * Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#default_follows_latest_issuer PkiSecretBackendConfigIssuers#default_follows_latest_issuer} */ readonly defaultFollowsLatestIssuer?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#id PkiSecretBackendConfigIssuers#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,13 +40,13 @@ export interface PkiSecretBackendConfigIssuersConfig extends cdktf.TerraformMeta /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#namespace PkiSecretBackendConfigIssuers#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers} */ export class PkiSecretBackendConfigIssuers extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class PkiSecretBackendConfigIssuers extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendConfigIssuers resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendConfigIssuers to import - * @param importFromId The id of the existing PkiSecretBackendConfigIssuers that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendConfigIssuers that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendConfigIssuers to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class PkiSecretBackendConfigIssuers extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_issuers vault_pki_secret_backend_config_issuers} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class PkiSecretBackendConfigIssuers extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_config_issuers', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-config-urls/README.md b/src/pki-secret-backend-config-urls/README.md index bc0bb328..5f360b1a 100644 --- a/src/pki-secret-backend-config-urls/README.md +++ b/src/pki-secret-backend-config-urls/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_config_urls` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_urls`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_config_urls`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls). diff --git a/src/pki-secret-backend-config-urls/index.ts b/src/pki-secret-backend-config-urls/index.ts index 463d96c7..7bfcc815 100644 --- a/src/pki-secret-backend-config-urls/index.ts +++ b/src/pki-secret-backend-config-urls/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,23 @@ export interface PkiSecretBackendConfigUrlsConfig extends cdktf.TerraformMetaArg /** * The path of the PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#backend PkiSecretBackendConfigUrls#backend} */ readonly backend: string; /** * Specifies the URL values for the CRL Distribution Points field. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#crl_distribution_points PkiSecretBackendConfigUrls#crl_distribution_points} */ readonly crlDistributionPoints?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id} + * Specifies that templating of AIA fields is allowed. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#enable_templating PkiSecretBackendConfigUrls#enable_templating} + */ + readonly enableTemplating?: boolean | cdktf.IResolvable; + /** + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#id PkiSecretBackendConfigUrls#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,25 +40,25 @@ export interface PkiSecretBackendConfigUrlsConfig extends cdktf.TerraformMetaArg /** * Specifies the URL values for the Issuing Certificate field. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#issuing_certificates PkiSecretBackendConfigUrls#issuing_certificates} */ readonly issuingCertificates?: string[]; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#namespace PkiSecretBackendConfigUrls#namespace} */ readonly namespace?: string; /** * Specifies the URL values for the OCSP Servers field. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#ocsp_servers PkiSecretBackendConfigUrls#ocsp_servers} */ readonly ocspServers?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls} */ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { @@ -68,7 +74,7 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendConfigUrls resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendConfigUrls to import - * @param importFromId The id of the existing PkiSecretBackendConfigUrls that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendConfigUrls that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendConfigUrls to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +86,7 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_config_urls vault_pki_secret_backend_config_urls} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +97,8 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_config_urls', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -104,6 +110,7 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { }); this._backend = config.backend; this._crlDistributionPoints = config.crlDistributionPoints; + this._enableTemplating = config.enableTemplating; this._id = config.id; this._issuingCertificates = config.issuingCertificates; this._namespace = config.namespace; @@ -143,6 +150,22 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { return this._crlDistributionPoints; } + // enable_templating - computed: false, optional: true, required: false + private _enableTemplating?: boolean | cdktf.IResolvable; + public get enableTemplating() { + return this.getBooleanAttribute('enable_templating'); + } + public set enableTemplating(value: boolean | cdktf.IResolvable) { + this._enableTemplating = value; + } + public resetEnableTemplating() { + this._enableTemplating = undefined; + } + // Temporarily expose input value. Use with caution. + public get enableTemplatingInput() { + return this._enableTemplating; + } + // id - computed: true, optional: true, required: false private _id?: string; public get id() { @@ -215,6 +238,7 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { return { backend: cdktf.stringToTerraform(this._backend), crl_distribution_points: cdktf.listMapper(cdktf.stringToTerraform, false)(this._crlDistributionPoints), + enable_templating: cdktf.booleanToTerraform(this._enableTemplating), id: cdktf.stringToTerraform(this._id), issuing_certificates: cdktf.listMapper(cdktf.stringToTerraform, false)(this._issuingCertificates), namespace: cdktf.stringToTerraform(this._namespace), @@ -236,6 +260,12 @@ export class PkiSecretBackendConfigUrls extends cdktf.TerraformResource { type: "list", storageClassType: "stringList", }, + enable_templating: { + value: cdktf.booleanToHclTerraform(this._enableTemplating), + isBlock: false, + type: "simple", + storageClassType: "boolean", + }, id: { value: cdktf.stringToHclTerraform(this._id), isBlock: false, diff --git a/src/pki-secret-backend-crl-config/README.md b/src/pki-secret-backend-crl-config/README.md index 752398fd..889bc41c 100644 --- a/src/pki-secret-backend-crl-config/README.md +++ b/src/pki-secret-backend-crl-config/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_crl_config` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_crl_config`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_crl_config`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config). diff --git a/src/pki-secret-backend-crl-config/index.ts b/src/pki-secret-backend-crl-config/index.ts index f89666cd..35bae900 100644 --- a/src/pki-secret-backend-crl-config/index.ts +++ b/src/pki-secret-backend-crl-config/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,53 +15,53 @@ export interface PkiSecretBackendCrlConfigConfig extends cdktf.TerraformMetaArgu /** * Enables or disables periodic rebuilding of the CRL upon expiry. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild PkiSecretBackendCrlConfig#auto_rebuild} */ readonly autoRebuild?: boolean | cdktf.IResolvable; /** * Grace period before CRL expiry to attempt rebuild of CRL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#auto_rebuild_grace_period PkiSecretBackendCrlConfig#auto_rebuild_grace_period} */ readonly autoRebuildGracePeriod?: string; /** * The path of the PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#backend PkiSecretBackendCrlConfig#backend} */ readonly backend: string; /** * Enable cross-cluster revocation request queues. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#cross_cluster_revocation PkiSecretBackendCrlConfig#cross_cluster_revocation} */ readonly crossClusterRevocation?: boolean | cdktf.IResolvable; /** * Interval to check for new revocations on, to regenerate the delta CRL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#delta_rebuild_interval PkiSecretBackendCrlConfig#delta_rebuild_interval} */ readonly deltaRebuildInterval?: string; /** * Disables or enables CRL building * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#disable PkiSecretBackendCrlConfig#disable} */ readonly disable?: boolean | cdktf.IResolvable; /** * Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#enable_delta PkiSecretBackendCrlConfig#enable_delta} */ readonly enableDelta?: boolean | cdktf.IResolvable; /** * Specifies the time until expiration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#expiry PkiSecretBackendCrlConfig#expiry} */ readonly expiry?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#id PkiSecretBackendCrlConfig#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -70,37 +70,37 @@ export interface PkiSecretBackendCrlConfigConfig extends cdktf.TerraformMetaArgu /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#namespace PkiSecretBackendCrlConfig#namespace} */ readonly namespace?: string; /** * Disables or enables the OCSP responder in Vault. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_disable PkiSecretBackendCrlConfig#ocsp_disable} */ readonly ocspDisable?: boolean | cdktf.IResolvable; /** * The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#ocsp_expiry PkiSecretBackendCrlConfig#ocsp_expiry} */ readonly ocspExpiry?: string; /** * Enables unified CRL and OCSP building. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl PkiSecretBackendCrlConfig#unified_crl} */ readonly unifiedCrl?: boolean | cdktf.IResolvable; /** * Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#unified_crl_on_existing_paths PkiSecretBackendCrlConfig#unified_crl_on_existing_paths} */ readonly unifiedCrlOnExistingPaths?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config} */ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { @@ -116,7 +116,7 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendCrlConfig resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendCrlConfig to import - * @param importFromId The id of the existing PkiSecretBackendCrlConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendCrlConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendCrlConfig to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -128,7 +128,7 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_crl_config vault_pki_secret_backend_crl_config} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -139,8 +139,8 @@ export class PkiSecretBackendCrlConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_crl_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-intermediate-cert-request/README.md b/src/pki-secret-backend-intermediate-cert-request/README.md index 2008b284..fc4cfcf0 100644 --- a/src/pki-secret-backend-intermediate-cert-request/README.md +++ b/src/pki-secret-backend-intermediate-cert-request/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_intermediate_cert_request` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_intermediate_cert_request`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_intermediate_cert_request`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request). diff --git a/src/pki-secret-backend-intermediate-cert-request/index.ts b/src/pki-secret-backend-intermediate-cert-request/index.ts index 7aac316a..ddfd52ae 100644 --- a/src/pki-secret-backend-intermediate-cert-request/index.ts +++ b/src/pki-secret-backend-intermediate-cert-request/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request // generated from terraform resource schema import { Construct } from 'constructs'; @@ -16,47 +16,47 @@ export interface PkiSecretBackendIntermediateCertRequestConfig extends cdktf.Ter * Set 'CA: true' in a Basic Constraints extension. Only needed as * a workaround in some compatibility scenarios with Active Directory Certificate Services. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#add_basic_constraints PkiSecretBackendIntermediateCertRequest#add_basic_constraints} */ readonly addBasicConstraints?: boolean | cdktf.IResolvable; /** * List of alternative names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#alt_names PkiSecretBackendIntermediateCertRequest#alt_names} */ readonly altNames?: string[]; /** * The PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#backend PkiSecretBackendIntermediateCertRequest#backend} */ readonly backend: string; /** * CN of intermediate to create. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#common_name PkiSecretBackendIntermediateCertRequest#common_name} */ readonly commonName: string; /** * The country. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#country PkiSecretBackendIntermediateCertRequest#country} */ readonly country?: string; /** * Flag to exclude CN from SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#exclude_cn_from_sans PkiSecretBackendIntermediateCertRequest#exclude_cn_from_sans} */ readonly excludeCnFromSans?: boolean | cdktf.IResolvable; /** * The format of data. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#format PkiSecretBackendIntermediateCertRequest#format} */ readonly format?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#id PkiSecretBackendIntermediateCertRequest#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -65,115 +65,115 @@ export interface PkiSecretBackendIntermediateCertRequestConfig extends cdktf.Ter /** * List of alternative IPs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ip_sans PkiSecretBackendIntermediateCertRequest#ip_sans} */ readonly ipSans?: string[]; /** * The number of bits to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_bits PkiSecretBackendIntermediateCertRequest#key_bits} */ readonly keyBits?: number; /** * When a new key is created with this request, optionally specifies the name for this. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_name PkiSecretBackendIntermediateCertRequest#key_name} */ readonly keyName?: string; /** * Specifies the key to use for generating this request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_ref PkiSecretBackendIntermediateCertRequest#key_ref} */ readonly keyRef?: string; /** * The desired key type. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#key_type PkiSecretBackendIntermediateCertRequest#key_type} */ readonly keyType?: string; /** * The locality. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#locality PkiSecretBackendIntermediateCertRequest#locality} */ readonly locality?: string; /** * The ID of the previously configured managed key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_id PkiSecretBackendIntermediateCertRequest#managed_key_id} */ readonly managedKeyId?: string; /** * The name of the previously configured managed key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#managed_key_name PkiSecretBackendIntermediateCertRequest#managed_key_name} */ readonly managedKeyName?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#namespace PkiSecretBackendIntermediateCertRequest#namespace} */ readonly namespace?: string; /** * The organization. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#organization PkiSecretBackendIntermediateCertRequest#organization} */ readonly organization?: string; /** * List of other SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#other_sans PkiSecretBackendIntermediateCertRequest#other_sans} */ readonly otherSans?: string[]; /** * The organization unit. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#ou PkiSecretBackendIntermediateCertRequest#ou} */ readonly ou?: string; /** * The postal code. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#postal_code PkiSecretBackendIntermediateCertRequest#postal_code} */ readonly postalCode?: string; /** * The private key format. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#private_key_format PkiSecretBackendIntermediateCertRequest#private_key_format} */ readonly privateKeyFormat?: string; /** * The province. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#province PkiSecretBackendIntermediateCertRequest#province} */ readonly province?: string; /** * The street address. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#street_address PkiSecretBackendIntermediateCertRequest#street_address} */ readonly streetAddress?: string; /** * Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms" * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#type PkiSecretBackendIntermediateCertRequest#type} */ readonly type: string; /** * List of alternative URIs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#uri_sans PkiSecretBackendIntermediateCertRequest#uri_sans} */ readonly uriSans?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request} */ export class PkiSecretBackendIntermediateCertRequest extends cdktf.TerraformResource { @@ -189,7 +189,7 @@ export class PkiSecretBackendIntermediateCertRequest extends cdktf.TerraformReso * Generates CDKTF code for importing a PkiSecretBackendIntermediateCertRequest resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendIntermediateCertRequest to import - * @param importFromId The id of the existing PkiSecretBackendIntermediateCertRequest that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendIntermediateCertRequest that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendIntermediateCertRequest to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -201,7 +201,7 @@ export class PkiSecretBackendIntermediateCertRequest extends cdktf.TerraformReso // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_cert_request vault_pki_secret_backend_intermediate_cert_request} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -212,8 +212,8 @@ export class PkiSecretBackendIntermediateCertRequest extends cdktf.TerraformReso terraformResourceType: 'vault_pki_secret_backend_intermediate_cert_request', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-intermediate-set-signed/README.md b/src/pki-secret-backend-intermediate-set-signed/README.md index e27d9ada..32e79713 100644 --- a/src/pki-secret-backend-intermediate-set-signed/README.md +++ b/src/pki-secret-backend-intermediate-set-signed/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_intermediate_set_signed` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_intermediate_set_signed`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_intermediate_set_signed`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed). diff --git a/src/pki-secret-backend-intermediate-set-signed/index.ts b/src/pki-secret-backend-intermediate-set-signed/index.ts index e04563ab..79ece84a 100644 --- a/src/pki-secret-backend-intermediate-set-signed/index.ts +++ b/src/pki-secret-backend-intermediate-set-signed/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface PkiSecretBackendIntermediateSetSignedConfig extends cdktf.Terra /** * The PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#backend PkiSecretBackendIntermediateSetSigned#backend} */ readonly backend: string; /** * The certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#certificate PkiSecretBackendIntermediateSetSigned#certificate} */ readonly certificate: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#id PkiSecretBackendIntermediateSetSigned#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,13 +34,13 @@ export interface PkiSecretBackendIntermediateSetSignedConfig extends cdktf.Terra /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#namespace PkiSecretBackendIntermediateSetSigned#namespace} */ readonly namespace?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed} */ export class PkiSecretBackendIntermediateSetSigned extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class PkiSecretBackendIntermediateSetSigned extends cdktf.TerraformResour * Generates CDKTF code for importing a PkiSecretBackendIntermediateSetSigned resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendIntermediateSetSigned to import - * @param importFromId The id of the existing PkiSecretBackendIntermediateSetSigned that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendIntermediateSetSigned that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendIntermediateSetSigned to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class PkiSecretBackendIntermediateSetSigned extends cdktf.TerraformResour // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_intermediate_set_signed vault_pki_secret_backend_intermediate_set_signed} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class PkiSecretBackendIntermediateSetSigned extends cdktf.TerraformResour terraformResourceType: 'vault_pki_secret_backend_intermediate_set_signed', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-issuer/README.md b/src/pki-secret-backend-issuer/README.md index fa344258..034ffa33 100644 --- a/src/pki-secret-backend-issuer/README.md +++ b/src/pki-secret-backend-issuer/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_issuer` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_issuer`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_issuer`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer). diff --git a/src/pki-secret-backend-issuer/index.ts b/src/pki-secret-backend-issuer/index.ts index 19a1c1c7..c01e17d4 100644 --- a/src/pki-secret-backend-issuer/index.ts +++ b/src/pki-secret-backend-issuer/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface PkiSecretBackendIssuerConfig extends cdktf.TerraformMetaArgumen /** * Full path where PKI backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#backend PkiSecretBackendIssuer#backend} */ readonly backend: string; /** * Specifies the URL values for the CRL Distribution Points field. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#crl_distribution_points PkiSecretBackendIssuer#crl_distribution_points} */ readonly crlDistributionPoints?: string[]; /** * Specifies that the AIA URL values should be templated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#enable_aia_url_templating PkiSecretBackendIssuer#enable_aia_url_templating} */ readonly enableAiaUrlTemplating?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#id PkiSecretBackendIssuer#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,61 +40,61 @@ export interface PkiSecretBackendIssuerConfig extends cdktf.TerraformMetaArgumen /** * Reference to an existing issuer. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_name PkiSecretBackendIssuer#issuer_name} */ readonly issuerName?: string; /** * Reference to an existing issuer. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuer_ref PkiSecretBackendIssuer#issuer_ref} */ readonly issuerRef: string; /** * Specifies the URL values for the Issuing Certificate field. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#issuing_certificates PkiSecretBackendIssuer#issuing_certificates} */ readonly issuingCertificates?: string[]; /** * Behavior of a leaf's 'NotAfter' field during issuance. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#leaf_not_after_behavior PkiSecretBackendIssuer#leaf_not_after_behavior} */ readonly leafNotAfterBehavior?: string; /** * Chain of issuer references to build this issuer's computed CAChain field from, when non-empty. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#manual_chain PkiSecretBackendIssuer#manual_chain} */ readonly manualChain?: string[]; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#namespace PkiSecretBackendIssuer#namespace} */ readonly namespace?: string; /** * Specifies the URL values for the OCSP Servers field. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#ocsp_servers PkiSecretBackendIssuer#ocsp_servers} */ readonly ocspServers?: string[]; /** * Which signature algorithm to use when building CRLs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#revocation_signature_algorithm PkiSecretBackendIssuer#revocation_signature_algorithm} */ readonly revocationSignatureAlgorithm?: string; /** * Comma-separated list of allowed usages for this issuer. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#usage PkiSecretBackendIssuer#usage} */ readonly usage?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer} */ export class PkiSecretBackendIssuer extends cdktf.TerraformResource { @@ -110,7 +110,7 @@ export class PkiSecretBackendIssuer extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendIssuer resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendIssuer to import - * @param importFromId The id of the existing PkiSecretBackendIssuer that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendIssuer that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendIssuer to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -122,7 +122,7 @@ export class PkiSecretBackendIssuer extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_issuer vault_pki_secret_backend_issuer} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -133,8 +133,8 @@ export class PkiSecretBackendIssuer extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_issuer', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-key/README.md b/src/pki-secret-backend-key/README.md index fb0273d7..d9798cf0 100644 --- a/src/pki-secret-backend-key/README.md +++ b/src/pki-secret-backend-key/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_key` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key). diff --git a/src/pki-secret-backend-key/index.ts b/src/pki-secret-backend-key/index.ts index 652e1012..360a08ba 100644 --- a/src/pki-secret-backend-key/index.ts +++ b/src/pki-secret-backend-key/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface PkiSecretBackendKeyConfig extends cdktf.TerraformMetaArguments /** * Full path where PKI backend is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#backend PkiSecretBackendKey#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#id PkiSecretBackendKey#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,49 +28,49 @@ export interface PkiSecretBackendKeyConfig extends cdktf.TerraformMetaArguments /** * Specifies the number of bits to use for the generated keys. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_bits PkiSecretBackendKey#key_bits} */ readonly keyBits?: number; /** * When a new key is created with this request, optionally specifies the name for this. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_name PkiSecretBackendKey#key_name} */ readonly keyName?: string; /** * Specifies the desired key type; must be 'rsa', 'ed25519' or 'ec'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#key_type PkiSecretBackendKey#key_type} */ readonly keyType?: string; /** * The managed key's UUID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_id PkiSecretBackendKey#managed_key_id} */ readonly managedKeyId?: string; /** * The managed key's configured name. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#managed_key_name PkiSecretBackendKey#managed_key_name} */ readonly managedKeyName?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#namespace PkiSecretBackendKey#namespace} */ readonly namespace?: string; /** * Specifies the type of the key to create. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#type PkiSecretBackendKey#type} */ readonly type: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key} */ export class PkiSecretBackendKey extends cdktf.TerraformResource { @@ -86,7 +86,7 @@ export class PkiSecretBackendKey extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendKey resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendKey to import - * @param importFromId The id of the existing PkiSecretBackendKey that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendKey that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendKey to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -98,7 +98,7 @@ export class PkiSecretBackendKey extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_key vault_pki_secret_backend_key} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -109,8 +109,8 @@ export class PkiSecretBackendKey extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_key', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-role/README.md b/src/pki-secret-backend-role/README.md index 841c0d88..9c731e09 100644 --- a/src/pki-secret-backend-role/README.md +++ b/src/pki-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_role` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role). diff --git a/src/pki-secret-backend-role/index.ts b/src/pki-secret-backend-role/index.ts index 69e23501..a74b09de 100644 --- a/src/pki-secret-backend-role/index.ts +++ b/src/pki-secret-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,149 +15,149 @@ export interface PkiSecretBackendRoleConfig extends cdktf.TerraformMetaArguments /** * Flag to allow any name * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} */ readonly allowAnyName?: boolean | cdktf.IResolvable; /** * Flag to allow certificates matching the actual domain. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} */ readonly allowBareDomains?: boolean | cdktf.IResolvable; /** * Flag to allow names containing glob patterns. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} */ readonly allowGlobDomains?: boolean | cdktf.IResolvable; /** * Flag to allow IP SANs * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} */ readonly allowIpSans?: boolean | cdktf.IResolvable; /** * Flag to allow certificates for localhost. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} */ readonly allowLocalhost?: boolean | cdktf.IResolvable; /** * Flag to allow certificates matching subdomains. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} */ readonly allowSubdomains?: boolean | cdktf.IResolvable; /** * Flag to allow wildcard certificates * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} */ readonly allowWildcardCertificates?: boolean | cdktf.IResolvable; /** * The domains of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} */ readonly allowedDomains?: string[]; /** * Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases..name}}) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} */ readonly allowedDomainsTemplate?: boolean | cdktf.IResolvable; /** * Defines allowed custom SANs * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} */ readonly allowedOtherSans?: string[]; /** * Defines allowed Subject serial numbers. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} */ readonly allowedSerialNumbers?: string[]; /** * Defines allowed URI SANs * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} */ readonly allowedUriSans?: string[]; /** * Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases..name}}) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} */ readonly allowedUriSansTemplate?: boolean | cdktf.IResolvable; /** * The allowed User ID's. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} */ readonly allowedUserIds?: string[]; /** * The path of the PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} */ readonly backend: string; /** * Flag to mark basic constraints valid when issuing non-CA certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} */ readonly basicConstraintsValidForNonCa?: boolean | cdktf.IResolvable; /** * Flag to specify certificates for client use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} */ readonly clientFlag?: boolean | cdktf.IResolvable; /** * Flag to specify certificates for code signing use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} */ readonly codeSigningFlag?: boolean | cdktf.IResolvable; /** * The country of generated certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} */ readonly country?: string[]; /** * Flag to specify certificates for email protection use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} */ readonly emailProtectionFlag?: boolean | cdktf.IResolvable; /** * Flag to allow only valid host names * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} */ readonly enforceHostnames?: boolean | cdktf.IResolvable; /** * Specify the allowed extended key usage constraint on issued certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} */ readonly extKeyUsage?: string[]; /** * A list of extended key usage OIDs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ext_key_usage_oids PkiSecretBackendRole#ext_key_usage_oids} */ readonly extKeyUsageOids?: string[]; /** * Flag to generate leases with certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} */ readonly generateLease?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -166,133 +166,133 @@ export interface PkiSecretBackendRoleConfig extends cdktf.TerraformMetaArguments /** * Specifies the default issuer of this request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} */ readonly issuerRef?: string; /** * The number of bits of generated keys. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} */ readonly keyBits?: number; /** * The generated key type. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} */ readonly keyType?: string; /** * Specify the allowed key usage constraint on issued certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} */ readonly keyUsage?: string[]; /** * The locality of generated certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} */ readonly locality?: string[]; /** * The maximum TTL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} */ readonly maxTtl?: string; /** * Unique name for the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} */ readonly namespace?: string; /** * Flag to not store certificates in the storage backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} */ readonly noStore?: boolean | cdktf.IResolvable; /** * Specifies the duration by which to backdate the NotBefore property. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} */ readonly notBeforeDuration?: string; /** * The organization of generated certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} */ readonly organization?: string[]; /** * The organization unit of generated certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} */ readonly ou?: string[]; /** * Specify the list of allowed policies OIDs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} */ readonly policyIdentifiers?: string[]; /** * The postal code of generated certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} */ readonly postalCode?: string[]; /** * The province of generated certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} */ readonly province?: string[]; /** * Flag to force CN usage. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} */ readonly requireCn?: boolean | cdktf.IResolvable; /** * Flag to specify certificates for server use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} */ readonly serverFlag?: boolean | cdktf.IResolvable; /** * The street address of generated certificates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} */ readonly streetAddress?: string[]; /** * The TTL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} */ readonly ttl?: string; /** * Flag to use the CN in the CSR. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} */ readonly useCsrCommonName?: boolean | cdktf.IResolvable; /** * Flag to use the SANs in the CSR. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} */ readonly useCsrSans?: boolean | cdktf.IResolvable; /** * policy_identifier block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} */ readonly policyIdentifier?: PkiSecretBackendRolePolicyIdentifier[] | cdktf.IResolvable; } @@ -300,19 +300,19 @@ export interface PkiSecretBackendRolePolicyIdentifier { /** * Optional CPS URL * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} */ readonly cps?: string; /** * Optional notice * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} */ readonly notice?: string; /** * OID * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} */ readonly oid: string; } @@ -483,7 +483,7 @@ export class PkiSecretBackendRolePolicyIdentifierList extends cdktf.ComplexList } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role} */ export class PkiSecretBackendRole extends cdktf.TerraformResource { @@ -499,7 +499,7 @@ export class PkiSecretBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendRole to import - * @param importFromId The id of the existing PkiSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -511,7 +511,7 @@ export class PkiSecretBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -522,8 +522,8 @@ export class PkiSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/pki-secret-backend-root-cert/README.md b/src/pki-secret-backend-root-cert/README.md index 2634f621..e6fbcf53 100644 --- a/src/pki-secret-backend-root-cert/README.md +++ b/src/pki-secret-backend-root-cert/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_root_cert` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_root_cert`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_root_cert`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert). diff --git a/src/pki-secret-backend-root-cert/index.ts b/src/pki-secret-backend-root-cert/index.ts index 944b78b6..eb7dd9d5 100644 --- a/src/pki-secret-backend-root-cert/index.ts +++ b/src/pki-secret-backend-root-cert/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,41 +15,41 @@ export interface PkiSecretBackendRootCertConfig extends cdktf.TerraformMetaArgum /** * List of alternative names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#alt_names PkiSecretBackendRootCert#alt_names} */ readonly altNames?: string[]; /** * The PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#backend PkiSecretBackendRootCert#backend} */ readonly backend: string; /** * CN of root to create. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#common_name PkiSecretBackendRootCert#common_name} */ readonly commonName: string; /** * The country. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#country PkiSecretBackendRootCert#country} */ readonly country?: string; /** * Flag to exclude CN from SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#exclude_cn_from_sans PkiSecretBackendRootCert#exclude_cn_from_sans} */ readonly excludeCnFromSans?: boolean | cdktf.IResolvable; /** * The format of data. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#format PkiSecretBackendRootCert#format} */ readonly format?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#id PkiSecretBackendRootCert#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -58,139 +58,139 @@ export interface PkiSecretBackendRootCertConfig extends cdktf.TerraformMetaArgum /** * List of alternative IPs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ip_sans PkiSecretBackendRootCert#ip_sans} */ readonly ipSans?: string[]; /** * Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#issuer_name PkiSecretBackendRootCert#issuer_name} */ readonly issuerName?: string; /** * The number of bits to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_bits PkiSecretBackendRootCert#key_bits} */ readonly keyBits?: number; /** * When a new key is created with this request, optionally specifies the name for this. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_name PkiSecretBackendRootCert#key_name} */ readonly keyName?: string; /** * Specifies the key to use for generating this request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_ref PkiSecretBackendRootCert#key_ref} */ readonly keyRef?: string; /** * The desired key type. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#key_type PkiSecretBackendRootCert#key_type} */ readonly keyType?: string; /** * The locality. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#locality PkiSecretBackendRootCert#locality} */ readonly locality?: string; /** * The ID of the previously configured managed key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_id PkiSecretBackendRootCert#managed_key_id} */ readonly managedKeyId?: string; /** * The name of the previously configured managed key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#managed_key_name PkiSecretBackendRootCert#managed_key_name} */ readonly managedKeyName?: string; /** * The maximum path length to encode in the generated certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#max_path_length PkiSecretBackendRootCert#max_path_length} */ readonly maxPathLength?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#namespace PkiSecretBackendRootCert#namespace} */ readonly namespace?: string; /** * The organization. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#organization PkiSecretBackendRootCert#organization} */ readonly organization?: string; /** * List of other SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#other_sans PkiSecretBackendRootCert#other_sans} */ readonly otherSans?: string[]; /** * The organization unit. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ou PkiSecretBackendRootCert#ou} */ readonly ou?: string; /** * List of domains for which certificates are allowed to be issued. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#permitted_dns_domains PkiSecretBackendRootCert#permitted_dns_domains} */ readonly permittedDnsDomains?: string[]; /** * The postal code. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#postal_code PkiSecretBackendRootCert#postal_code} */ readonly postalCode?: string; /** * The private key format. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#private_key_format PkiSecretBackendRootCert#private_key_format} */ readonly privateKeyFormat?: string; /** * The province. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#province PkiSecretBackendRootCert#province} */ readonly province?: string; /** * The street address. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#street_address PkiSecretBackendRootCert#street_address} */ readonly streetAddress?: string; /** * Time to live. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#ttl PkiSecretBackendRootCert#ttl} */ readonly ttl?: string; /** * Type of root to create. Must be either "existing", "exported", "internal" or "kms" * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#type PkiSecretBackendRootCert#type} */ readonly type: string; /** * List of alternative URIs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#uri_sans PkiSecretBackendRootCert#uri_sans} */ readonly uriSans?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert} */ export class PkiSecretBackendRootCert extends cdktf.TerraformResource { @@ -206,7 +206,7 @@ export class PkiSecretBackendRootCert extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendRootCert resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendRootCert to import - * @param importFromId The id of the existing PkiSecretBackendRootCert that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendRootCert that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendRootCert to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -218,7 +218,7 @@ export class PkiSecretBackendRootCert extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_cert vault_pki_secret_backend_root_cert} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -229,8 +229,8 @@ export class PkiSecretBackendRootCert extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_root_cert', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -689,11 +689,6 @@ export class PkiSecretBackendRootCert extends cdktf.TerraformResource { return this._province; } - // serial - computed: true, optional: false, required: false - public get serial() { - return this.getStringAttribute('serial'); - } - // serial_number - computed: true, optional: false, required: false public get serialNumber() { return this.getStringAttribute('serial_number'); diff --git a/src/pki-secret-backend-root-sign-intermediate/README.md b/src/pki-secret-backend-root-sign-intermediate/README.md index 0996bb32..c019b305 100644 --- a/src/pki-secret-backend-root-sign-intermediate/README.md +++ b/src/pki-secret-backend-root-sign-intermediate/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_root_sign_intermediate` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_root_sign_intermediate`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_root_sign_intermediate`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate). diff --git a/src/pki-secret-backend-root-sign-intermediate/index.ts b/src/pki-secret-backend-root-sign-intermediate/index.ts index 4f748f12..3f704815 100644 --- a/src/pki-secret-backend-root-sign-intermediate/index.ts +++ b/src/pki-secret-backend-root-sign-intermediate/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,47 +15,47 @@ export interface PkiSecretBackendRootSignIntermediateConfig extends cdktf.Terraf /** * List of alternative names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#alt_names PkiSecretBackendRootSignIntermediate#alt_names} */ readonly altNames?: string[]; /** * The PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#backend PkiSecretBackendRootSignIntermediate#backend} */ readonly backend: string; /** * CN of intermediate to create. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#common_name PkiSecretBackendRootSignIntermediate#common_name} */ readonly commonName: string; /** * The country. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#country PkiSecretBackendRootSignIntermediate#country} */ readonly country?: string; /** * The CSR. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#csr PkiSecretBackendRootSignIntermediate#csr} */ readonly csr: string; /** * Flag to exclude CN from SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#exclude_cn_from_sans PkiSecretBackendRootSignIntermediate#exclude_cn_from_sans} */ readonly excludeCnFromSans?: boolean | cdktf.IResolvable; /** * The format of data. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#format PkiSecretBackendRootSignIntermediate#format} */ readonly format?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#id PkiSecretBackendRootSignIntermediate#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -64,103 +64,103 @@ export interface PkiSecretBackendRootSignIntermediateConfig extends cdktf.Terraf /** * List of alternative IPs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ip_sans PkiSecretBackendRootSignIntermediate#ip_sans} */ readonly ipSans?: string[]; /** * Specifies the default issuer of this request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#issuer_ref PkiSecretBackendRootSignIntermediate#issuer_ref} */ readonly issuerRef?: string; /** * The locality. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#locality PkiSecretBackendRootSignIntermediate#locality} */ readonly locality?: string; /** * The maximum path length to encode in the generated certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#max_path_length PkiSecretBackendRootSignIntermediate#max_path_length} */ readonly maxPathLength?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#namespace PkiSecretBackendRootSignIntermediate#namespace} */ readonly namespace?: string; /** * The organization. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#organization PkiSecretBackendRootSignIntermediate#organization} */ readonly organization?: string; /** * List of other SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#other_sans PkiSecretBackendRootSignIntermediate#other_sans} */ readonly otherSans?: string[]; /** * The organization unit. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ou PkiSecretBackendRootSignIntermediate#ou} */ readonly ou?: string; /** * List of domains for which certificates are allowed to be issued. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#permitted_dns_domains PkiSecretBackendRootSignIntermediate#permitted_dns_domains} */ readonly permittedDnsDomains?: string[]; /** * The postal code. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#postal_code PkiSecretBackendRootSignIntermediate#postal_code} */ readonly postalCode?: string; /** * The province. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#province PkiSecretBackendRootSignIntermediate#province} */ readonly province?: string; /** * Revoke the certificate upon resource destruction. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#revoke PkiSecretBackendRootSignIntermediate#revoke} */ readonly revoke?: boolean | cdktf.IResolvable; /** * The street address. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#street_address PkiSecretBackendRootSignIntermediate#street_address} */ readonly streetAddress?: string; /** * Time to live. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#ttl PkiSecretBackendRootSignIntermediate#ttl} */ readonly ttl?: string; /** * List of alternative URIs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#uri_sans PkiSecretBackendRootSignIntermediate#uri_sans} */ readonly uriSans?: string[]; /** * Preserve CSR values. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#use_csr_values PkiSecretBackendRootSignIntermediate#use_csr_values} */ readonly useCsrValues?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate} */ export class PkiSecretBackendRootSignIntermediate extends cdktf.TerraformResource { @@ -176,7 +176,7 @@ export class PkiSecretBackendRootSignIntermediate extends cdktf.TerraformResourc * Generates CDKTF code for importing a PkiSecretBackendRootSignIntermediate resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendRootSignIntermediate to import - * @param importFromId The id of the existing PkiSecretBackendRootSignIntermediate that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendRootSignIntermediate that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendRootSignIntermediate to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -188,7 +188,7 @@ export class PkiSecretBackendRootSignIntermediate extends cdktf.TerraformResourc // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_root_sign_intermediate vault_pki_secret_backend_root_sign_intermediate} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -199,8 +199,8 @@ export class PkiSecretBackendRootSignIntermediate extends cdktf.TerraformResourc terraformResourceType: 'vault_pki_secret_backend_root_sign_intermediate', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -571,11 +571,6 @@ export class PkiSecretBackendRootSignIntermediate extends cdktf.TerraformResourc return this._revoke; } - // serial - computed: true, optional: false, required: false - public get serial() { - return this.getStringAttribute('serial'); - } - // serial_number - computed: true, optional: false, required: false public get serialNumber() { return this.getStringAttribute('serial_number'); diff --git a/src/pki-secret-backend-sign/README.md b/src/pki-secret-backend-sign/README.md index e3996a0d..3e727aeb 100644 --- a/src/pki-secret-backend-sign/README.md +++ b/src/pki-secret-backend-sign/README.md @@ -1,3 +1,3 @@ # `vault_pki_secret_backend_sign` -Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_sign`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign). +Refer to the Terraform Registry for docs: [`vault_pki_secret_backend_sign`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign). diff --git a/src/pki-secret-backend-sign/index.ts b/src/pki-secret-backend-sign/index.ts index 3c1bcb1b..b237ef05 100644 --- a/src/pki-secret-backend-sign/index.ts +++ b/src/pki-secret-backend-sign/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,47 +15,47 @@ export interface PkiSecretBackendSignConfig extends cdktf.TerraformMetaArguments /** * List of alternative names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#alt_names PkiSecretBackendSign#alt_names} */ readonly altNames?: string[]; /** * If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#auto_renew PkiSecretBackendSign#auto_renew} */ readonly autoRenew?: boolean | cdktf.IResolvable; /** * The PKI secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#backend PkiSecretBackendSign#backend} */ readonly backend: string; /** * CN of intermediate to create. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#common_name PkiSecretBackendSign#common_name} */ readonly commonName: string; /** * The CSR. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#csr PkiSecretBackendSign#csr} */ readonly csr: string; /** * Flag to exclude CN from SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#exclude_cn_from_sans PkiSecretBackendSign#exclude_cn_from_sans} */ readonly excludeCnFromSans?: boolean | cdktf.IResolvable; /** * The format of data. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#format PkiSecretBackendSign#format} */ readonly format?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#id PkiSecretBackendSign#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -64,55 +64,55 @@ export interface PkiSecretBackendSignConfig extends cdktf.TerraformMetaArguments /** * List of alternative IPs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ip_sans PkiSecretBackendSign#ip_sans} */ readonly ipSans?: string[]; /** * Specifies the default issuer of this request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#issuer_ref PkiSecretBackendSign#issuer_ref} */ readonly issuerRef?: string; /** * Generate a new certificate when the expiration is within this number of seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#min_seconds_remaining PkiSecretBackendSign#min_seconds_remaining} */ readonly minSecondsRemaining?: number; /** * Name of the role to create the certificate against. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#name PkiSecretBackendSign#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#namespace PkiSecretBackendSign#namespace} */ readonly namespace?: string; /** * List of other SANs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#other_sans PkiSecretBackendSign#other_sans} */ readonly otherSans?: string[]; /** * Time to live. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#ttl PkiSecretBackendSign#ttl} */ readonly ttl?: string; /** * List of alternative URIs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#uri_sans PkiSecretBackendSign#uri_sans} */ readonly uriSans?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign} */ export class PkiSecretBackendSign extends cdktf.TerraformResource { @@ -128,7 +128,7 @@ export class PkiSecretBackendSign extends cdktf.TerraformResource { * Generates CDKTF code for importing a PkiSecretBackendSign resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the PkiSecretBackendSign to import - * @param importFromId The id of the existing PkiSecretBackendSign that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing PkiSecretBackendSign that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the PkiSecretBackendSign to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -140,7 +140,7 @@ export class PkiSecretBackendSign extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/pki_secret_backend_sign vault_pki_secret_backend_sign} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -151,8 +151,8 @@ export class PkiSecretBackendSign extends cdktf.TerraformResource { terraformResourceType: 'vault_pki_secret_backend_sign', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -421,11 +421,6 @@ export class PkiSecretBackendSign extends cdktf.TerraformResource { return this.getBooleanAttribute('renew_pending'); } - // serial - computed: true, optional: false, required: false - public get serial() { - return this.getStringAttribute('serial'); - } - // serial_number - computed: true, optional: false, required: false public get serialNumber() { return this.getStringAttribute('serial_number'); diff --git a/src/policy/README.md b/src/policy/README.md index 2ae54f7f..250876ef 100644 --- a/src/policy/README.md +++ b/src/policy/README.md @@ -1,3 +1,3 @@ # `vault_policy` -Refer to the Terraform Registry for docs: [`vault_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy). +Refer to the Terraform Registry for docs: [`vault_policy`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy). diff --git a/src/policy/index.ts b/src/policy/index.ts index b778c5e4..015c9db2 100644 --- a/src/policy/index.ts +++ b/src/policy/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface PolicyConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#id Policy#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#id Policy#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,25 +22,25 @@ export interface PolicyConfig extends cdktf.TerraformMetaArguments { /** * Name of the policy * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#name Policy#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#name Policy#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#namespace Policy#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#namespace Policy#namespace} */ readonly namespace?: string; /** * The policy document * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#policy Policy#policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#policy Policy#policy} */ readonly policy: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy vault_policy} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy vault_policy} */ export class Policy extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class Policy extends cdktf.TerraformResource { * Generates CDKTF code for importing a Policy resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the Policy to import - * @param importFromId The id of the existing Policy that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing Policy that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the Policy to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class Policy extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/policy vault_policy} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/policy vault_policy} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class Policy extends cdktf.TerraformResource { terraformResourceType: 'vault_policy', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/provider/README.md b/src/provider/README.md index 95e1e23c..2c734f26 100644 --- a/src/provider/README.md +++ b/src/provider/README.md @@ -1,3 +1,3 @@ # `provider` -Refer to the Terraform Registry for docs: [`vault`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs). +Refer to the Terraform Registry for docs: [`vault`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs). diff --git a/src/provider/index.ts b/src/provider/index.ts index 2f6a2b8e..3be72723 100644 --- a/src/provider/index.ts +++ b/src/provider/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,213 +15,213 @@ export interface VaultProviderConfig { /** * If true, adds the value of the `address` argument to the Terraform process environment. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#add_address_to_env VaultProvider#add_address_to_env} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#add_address_to_env VaultProvider#add_address_to_env} */ readonly addAddressToEnv?: string; /** * URL of the root of the target Vault server. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#address VaultProvider#address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#address VaultProvider#address} */ readonly address: string; /** * Path to directory containing CA certificate files to validate the server's certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_dir VaultProvider#ca_cert_dir} */ readonly caCertDir?: string; /** * Path to a CA certificate file to validate the server's certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#ca_cert_file VaultProvider#ca_cert_file} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#ca_cert_file VaultProvider#ca_cert_file} */ readonly caCertFile?: string; /** * Maximum TTL for secret leases requested by this provider. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_lease_ttl_seconds VaultProvider#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Maximum number of retries when a 5xx error code is encountered. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries VaultProvider#max_retries} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries VaultProvider#max_retries} */ readonly maxRetries?: number; /** * Maximum number of retries for Client Controlled Consistency related operations * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#max_retries_ccc VaultProvider#max_retries_ccc} */ readonly maxRetriesCcc?: number; /** * The namespace to use. Available only for Vault Enterprise. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#set_namespace_from_token VaultProvider#set_namespace_from_token} */ readonly setNamespaceFromToken?: boolean | cdktf.IResolvable; /** * Set this to true to prevent the creation of ephemeral child token used by this provider. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_child_token VaultProvider#skip_child_token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_child_token VaultProvider#skip_child_token} */ readonly skipChildToken?: boolean | cdktf.IResolvable; /** * Skip the dynamic fetching of the Vault server version. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_get_vault_version VaultProvider#skip_get_vault_version} */ readonly skipGetVaultVersion?: boolean | cdktf.IResolvable; /** * Set this to true only if the target Vault server is an insecure development instance. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#skip_tls_verify VaultProvider#skip_tls_verify} */ readonly skipTlsVerify?: boolean | cdktf.IResolvable; /** * Name to use as the SNI host when connecting via TLS. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tls_server_name VaultProvider#tls_server_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tls_server_name VaultProvider#tls_server_name} */ readonly tlsServerName?: string; /** * Token to use to authenticate to Vault. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} */ readonly token?: string; /** * Token name to use for creating the Vault child token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token_name VaultProvider#token_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token_name VaultProvider#token_name} */ readonly tokenName?: string; /** * Override the Vault server version, which is normally determined dynamically from the target Vault server * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vault_version_override VaultProvider#vault_version_override} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vault_version_override VaultProvider#vault_version_override} */ readonly vaultVersionOverride?: string; /** * Alias name * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#alias VaultProvider#alias} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#alias VaultProvider#alias} */ readonly alias?: string; /** * auth_login block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login VaultProvider#auth_login} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login VaultProvider#auth_login} */ readonly authLogin?: VaultProviderAuthLogin; /** * auth_login_aws block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_aws VaultProvider#auth_login_aws} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_aws VaultProvider#auth_login_aws} */ readonly authLoginAws?: VaultProviderAuthLoginAws; /** * auth_login_azure block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_azure VaultProvider#auth_login_azure} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_azure VaultProvider#auth_login_azure} */ readonly authLoginAzure?: VaultProviderAuthLoginAzure; /** * auth_login_cert block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_cert VaultProvider#auth_login_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_cert VaultProvider#auth_login_cert} */ readonly authLoginCert?: VaultProviderAuthLoginCert; /** * auth_login_gcp block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_gcp VaultProvider#auth_login_gcp} */ readonly authLoginGcp?: VaultProviderAuthLoginGcp; /** * auth_login_jwt block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_jwt VaultProvider#auth_login_jwt} */ readonly authLoginJwt?: VaultProviderAuthLoginJwt; /** * auth_login_kerberos block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_kerberos VaultProvider#auth_login_kerberos} */ readonly authLoginKerberos?: VaultProviderAuthLoginKerberos; /** * auth_login_oci block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oci VaultProvider#auth_login_oci} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oci VaultProvider#auth_login_oci} */ readonly authLoginOci?: VaultProviderAuthLoginOci; /** * auth_login_oidc block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_oidc VaultProvider#auth_login_oidc} */ readonly authLoginOidc?: VaultProviderAuthLoginOidc; /** * auth_login_radius block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_radius VaultProvider#auth_login_radius} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_radius VaultProvider#auth_login_radius} */ readonly authLoginRadius?: VaultProviderAuthLoginRadius; /** * auth_login_token_file block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_token_file VaultProvider#auth_login_token_file} */ readonly authLoginTokenFile?: VaultProviderAuthLoginTokenFile; /** * auth_login_userpass block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_login_userpass VaultProvider#auth_login_userpass} */ readonly authLoginUserpass?: VaultProviderAuthLoginUserpass; /** * client_auth block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_auth VaultProvider#client_auth} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_auth VaultProvider#client_auth} */ readonly clientAuth?: VaultProviderClientAuth; /** * headers block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#headers VaultProvider#headers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#headers VaultProvider#headers} */ readonly headers?: VaultProviderHeaders[] | cdktf.IResolvable; } export interface VaultProviderAuthLogin { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#method VaultProvider#method} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#method VaultProvider#method} */ readonly method?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#parameters VaultProvider#parameters} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#parameters VaultProvider#parameters} */ readonly parameters?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#path VaultProvider#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#path VaultProvider#path} */ readonly path: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; } @@ -287,97 +287,97 @@ export interface VaultProviderAuthLoginAws { /** * The AWS access key ID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_access_key_id VaultProvider#aws_access_key_id} */ readonly awsAccessKeyId?: string; /** * The IAM endpoint URL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_iam_endpoint VaultProvider#aws_iam_endpoint} */ readonly awsIamEndpoint?: string; /** * The name of the AWS profile. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_profile VaultProvider#aws_profile} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_profile VaultProvider#aws_profile} */ readonly awsProfile?: string; /** * The AWS region. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_region VaultProvider#aws_region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_region VaultProvider#aws_region} */ readonly awsRegion?: string; /** * The ARN of the AWS Role to assume.Used during STS AssumeRole * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_arn VaultProvider#aws_role_arn} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_arn VaultProvider#aws_role_arn} */ readonly awsRoleArn?: string; /** * Specifies the name to attach to the AWS role session. Used during STS AssumeRole * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_role_session_name VaultProvider#aws_role_session_name} */ readonly awsRoleSessionName?: string; /** * The AWS secret access key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_secret_access_key VaultProvider#aws_secret_access_key} */ readonly awsSecretAccessKey?: string; /** * The AWS session token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_session_token VaultProvider#aws_session_token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_session_token VaultProvider#aws_session_token} */ readonly awsSessionToken?: string; /** * Path to the AWS shared credentials file. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_shared_credentials_file VaultProvider#aws_shared_credentials_file} */ readonly awsSharedCredentialsFile?: string; /** * The STS endpoint URL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_sts_endpoint VaultProvider#aws_sts_endpoint} */ readonly awsStsEndpoint?: string; /** * Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#aws_web_identity_token_file VaultProvider#aws_web_identity_token_file} */ readonly awsWebIdentityTokenFile?: string; /** * The Vault header value to include in the STS signing request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#header_value VaultProvider#header_value} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#header_value VaultProvider#header_value} */ readonly headerValue?: string; /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * The Vault role to use when logging into Vault. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} */ readonly role: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; } @@ -520,73 +520,73 @@ export interface VaultProviderAuthLoginAzure { /** * The identity's client ID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#client_id VaultProvider#client_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#client_id VaultProvider#client_id} */ readonly clientId?: string; /** * A signed JSON Web Token. If not specified on will be created automatically * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} */ readonly jwt?: string; /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#resource_group_name VaultProvider#resource_group_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#resource_group_name VaultProvider#resource_group_name} */ readonly resourceGroupName: string; /** * Name of the login role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} */ readonly role: string; /** * The scopes to include in the token request. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#scope VaultProvider#scope} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#scope VaultProvider#scope} */ readonly scope?: string; /** * The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#subscription_id VaultProvider#subscription_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#subscription_id VaultProvider#subscription_id} */ readonly subscriptionId: string; /** * Provides the tenant ID to use in a multi-tenant authentication scenario. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#tenant_id VaultProvider#tenant_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#tenant_id VaultProvider#tenant_id} */ readonly tenantId?: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; /** * The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vm_name VaultProvider#vm_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vm_name VaultProvider#vm_name} */ readonly vmName?: string; /** * The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#vmss_name VaultProvider#vmss_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#vmss_name VaultProvider#vmss_name} */ readonly vmssName?: string; } @@ -701,37 +701,37 @@ export interface VaultProviderAuthLoginCert { /** * Path to a file containing the client certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} */ readonly certFile: string; /** * Path to a file containing the private key that the certificate was issued for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} */ readonly keyFile: string; /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * Name of the certificate's role * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} */ readonly name?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; } @@ -804,43 +804,43 @@ export interface VaultProviderAuthLoginGcp { /** * Path to the Google Cloud credentials file. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#credentials VaultProvider#credentials} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#credentials VaultProvider#credentials} */ readonly credentials?: string; /** * A signed JSON Web Token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} */ readonly jwt?: string; /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * Name of the login role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} */ readonly role: string; /** * IAM service account. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service_account VaultProvider#service_account} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service_account VaultProvider#service_account} */ readonly serviceAccount?: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; } @@ -920,31 +920,31 @@ export interface VaultProviderAuthLoginJwt { /** * A signed JSON Web Token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#jwt VaultProvider#jwt} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#jwt VaultProvider#jwt} */ readonly jwt: string; /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * Name of the login role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} */ readonly role: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; } @@ -1010,67 +1010,67 @@ export interface VaultProviderAuthLoginKerberos { /** * Disable the Kerberos FAST negotiation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#disable_fast_negotiation VaultProvider#disable_fast_negotiation} */ readonly disableFastNegotiation?: boolean | cdktf.IResolvable; /** * The Kerberos keytab file containing the entry of the login entity. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#keytab_path VaultProvider#keytab_path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#keytab_path VaultProvider#keytab_path} */ readonly keytabPath?: string; /** * A valid Kerberos configuration file e.g. /etc/krb5.conf. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#krb5conf_path VaultProvider#krb5conf_path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#krb5conf_path VaultProvider#krb5conf_path} */ readonly krb5ConfPath?: string; /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * The Kerberos server's authoritative authentication domain * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#realm VaultProvider#realm} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#realm VaultProvider#realm} */ readonly realm?: string; /** * Strip the host from the username found in the keytab. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#remove_instance_name VaultProvider#remove_instance_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#remove_instance_name VaultProvider#remove_instance_name} */ readonly removeInstanceName?: boolean | cdktf.IResolvable; /** * The service principle name. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#service VaultProvider#service} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#service VaultProvider#service} */ readonly service?: string; /** * Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#token VaultProvider#token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#token VaultProvider#token} */ readonly token?: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; /** * The username to login into Kerberos with. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} */ readonly username?: string; } @@ -1178,31 +1178,31 @@ export interface VaultProviderAuthLoginOci { /** * Authentication type to use when getting OCI credentials. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#auth_type VaultProvider#auth_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#auth_type VaultProvider#auth_type} */ readonly authType: string; /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * Name of the login role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} */ readonly role: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; } @@ -1268,37 +1268,37 @@ export interface VaultProviderAuthLoginOidc { /** * The callback address. Must be a valid URI without the path. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_address VaultProvider#callback_address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_address VaultProvider#callback_address} */ readonly callbackAddress?: string; /** * The callback listener's address. Must be a valid URI without the path. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#callback_listener_address VaultProvider#callback_listener_address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#callback_listener_address VaultProvider#callback_listener_address} */ readonly callbackListenerAddress?: string; /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * Name of the login role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#role VaultProvider#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#role VaultProvider#role} */ readonly role: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; } @@ -1371,31 +1371,31 @@ export interface VaultProviderAuthLoginRadius { /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * The Radius password for username. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} */ readonly password: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; /** * The Radius username. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} */ readonly username: string; } @@ -1461,19 +1461,19 @@ export interface VaultProviderAuthLoginTokenFile { /** * The name of a file containing a single line that is a valid Vault token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#filename VaultProvider#filename} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#filename VaultProvider#filename} */ readonly filename: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; } @@ -1525,37 +1525,37 @@ export interface VaultProviderAuthLoginUserpass { /** * The path where the authentication engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#mount VaultProvider#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#mount VaultProvider#mount} */ readonly mount?: string; /** * The authentication engine's namespace. Conflicts with use_root_namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#namespace VaultProvider#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#namespace VaultProvider#namespace} */ readonly namespace?: string; /** * Login with password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password VaultProvider#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password VaultProvider#password} */ readonly password?: string; /** * Login with password from a file * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#password_file VaultProvider#password_file} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#password_file VaultProvider#password_file} */ readonly passwordFile?: string; /** * Authenticate to the root Vault namespace. Conflicts with namespace * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#use_root_namespace VaultProvider#use_root_namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#use_root_namespace VaultProvider#use_root_namespace} */ readonly useRootNamespace?: boolean | cdktf.IResolvable; /** * Login with username * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#username VaultProvider#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#username VaultProvider#username} */ readonly username: string; } @@ -1628,13 +1628,13 @@ export interface VaultProviderClientAuth { /** * Path to a file containing the client certificate. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#cert_file VaultProvider#cert_file} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#cert_file VaultProvider#cert_file} */ readonly certFile?: string; /** * Path to a file containing the private key that the certificate was issued for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#key_file VaultProvider#key_file} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#key_file VaultProvider#key_file} */ readonly keyFile?: string; } @@ -1679,13 +1679,13 @@ export interface VaultProviderHeaders { /** * The header name * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#name VaultProvider#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#name VaultProvider#name} */ readonly name: string; /** * The header value * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#value VaultProvider#value} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#value VaultProvider#value} */ readonly value: string; } @@ -1728,7 +1728,7 @@ export function vaultProviderHeadersToHclTerraform(struct?: VaultProviderHeaders /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs vault} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs vault} */ export class VaultProvider extends cdktf.TerraformProvider { @@ -1744,7 +1744,7 @@ export class VaultProvider extends cdktf.TerraformProvider { * Generates CDKTF code for importing a VaultProvider resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the VaultProvider to import - * @param importFromId The id of the existing VaultProvider that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing VaultProvider that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the VaultProvider to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -1756,7 +1756,7 @@ export class VaultProvider extends cdktf.TerraformProvider { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs vault} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs vault} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -1767,8 +1767,8 @@ export class VaultProvider extends cdktf.TerraformProvider { terraformResourceType: 'vault', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, terraformProviderSource: 'hashicorp/vault' }); diff --git a/src/quota-lease-count/README.md b/src/quota-lease-count/README.md index b416f59b..b774d5d6 100644 --- a/src/quota-lease-count/README.md +++ b/src/quota-lease-count/README.md @@ -1,3 +1,3 @@ # `vault_quota_lease_count` -Refer to the Terraform Registry for docs: [`vault_quota_lease_count`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count). +Refer to the Terraform Registry for docs: [`vault_quota_lease_count`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count). diff --git a/src/quota-lease-count/index.ts b/src/quota-lease-count/index.ts index 4c89e3b2..49a45668 100644 --- a/src/quota-lease-count/index.ts +++ b/src/quota-lease-count/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface QuotaLeaseCountConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#id QuotaLeaseCount#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,37 +22,37 @@ export interface QuotaLeaseCountConfig extends cdktf.TerraformMetaArguments { /** * The maximum number of leases to be allowed by the quota rule. The max_leases must be positive. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#max_leases QuotaLeaseCount#max_leases} */ readonly maxLeases: number; /** * The name of the quota. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#name QuotaLeaseCount#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#namespace QuotaLeaseCount#namespace} */ readonly namespace?: string; /** * Path of the mount or namespace to apply the quota. A blank path configures a global lease count quota. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#path QuotaLeaseCount#path} */ readonly path?: string; /** * If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#role QuotaLeaseCount#role} */ readonly role?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count vault_quota_lease_count} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count vault_quota_lease_count} */ export class QuotaLeaseCount extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class QuotaLeaseCount extends cdktf.TerraformResource { * Generates CDKTF code for importing a QuotaLeaseCount resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the QuotaLeaseCount to import - * @param importFromId The id of the existing QuotaLeaseCount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing QuotaLeaseCount that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the QuotaLeaseCount to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class QuotaLeaseCount extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_lease_count vault_quota_lease_count} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_lease_count vault_quota_lease_count} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class QuotaLeaseCount extends cdktf.TerraformResource { terraformResourceType: 'vault_quota_lease_count', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/quota-rate-limit/README.md b/src/quota-rate-limit/README.md index 8d9bd99d..aae2a295 100644 --- a/src/quota-rate-limit/README.md +++ b/src/quota-rate-limit/README.md @@ -1,3 +1,3 @@ # `vault_quota_rate_limit` -Refer to the Terraform Registry for docs: [`vault_quota_rate_limit`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit). +Refer to the Terraform Registry for docs: [`vault_quota_rate_limit`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit). diff --git a/src/quota-rate-limit/index.ts b/src/quota-rate-limit/index.ts index 3064721b..64136130 100644 --- a/src/quota-rate-limit/index.ts +++ b/src/quota-rate-limit/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface QuotaRateLimitConfig extends cdktf.TerraformMetaArguments { /** * If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' in seconds has elapsed. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#block_interval QuotaRateLimit#block_interval} */ readonly blockInterval?: number; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#id QuotaRateLimit#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,43 +28,43 @@ export interface QuotaRateLimitConfig extends cdktf.TerraformMetaArguments { /** * The duration in seconds to enforce rate limiting for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#interval QuotaRateLimit#interval} */ readonly interval?: number; /** * The name of the quota. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#name QuotaRateLimit#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#namespace QuotaRateLimit#namespace} */ readonly namespace?: string; /** * Path of the mount or namespace to apply the quota. A blank path configures a global rate limit quota. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#path QuotaRateLimit#path} */ readonly path?: string; /** * The maximum number of requests at any given second to be allowed by the quota rule. The rate must be positive. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#rate QuotaRateLimit#rate} */ readonly rate: number; /** * If set on a quota where path is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#role QuotaRateLimit#role} */ readonly role?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit vault_quota_rate_limit} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit vault_quota_rate_limit} */ export class QuotaRateLimit extends cdktf.TerraformResource { @@ -80,7 +80,7 @@ export class QuotaRateLimit extends cdktf.TerraformResource { * Generates CDKTF code for importing a QuotaRateLimit resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the QuotaRateLimit to import - * @param importFromId The id of the existing QuotaRateLimit that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing QuotaRateLimit that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the QuotaRateLimit to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +92,7 @@ export class QuotaRateLimit extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/quota_rate_limit vault_quota_rate_limit} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/quota_rate_limit vault_quota_rate_limit} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +103,8 @@ export class QuotaRateLimit extends cdktf.TerraformResource { terraformResourceType: 'vault_quota_rate_limit', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/rabbitmq-secret-backend-role/README.md b/src/rabbitmq-secret-backend-role/README.md index daf981b7..08135421 100644 --- a/src/rabbitmq-secret-backend-role/README.md +++ b/src/rabbitmq-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_rabbitmq_secret_backend_role` -Refer to the Terraform Registry for docs: [`vault_rabbitmq_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_rabbitmq_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role). diff --git a/src/rabbitmq-secret-backend-role/index.ts b/src/rabbitmq-secret-backend-role/index.ts index 1e172373..a57d4783 100644 --- a/src/rabbitmq-secret-backend-role/index.ts +++ b/src/rabbitmq-secret-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface RabbitmqSecretBackendRoleConfig extends cdktf.TerraformMetaArgu /** * The path of the Rabbitmq Secret Backend the role belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#backend RabbitmqSecretBackendRole#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#id RabbitmqSecretBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,31 +28,31 @@ export interface RabbitmqSecretBackendRoleConfig extends cdktf.TerraformMetaArgu /** * Unique name for the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#name RabbitmqSecretBackendRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#namespace RabbitmqSecretBackendRole#namespace} */ readonly namespace?: string; /** * Specifies a comma-separated RabbitMQ management tags. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#tags RabbitmqSecretBackendRole#tags} */ readonly tags?: string; /** * vhost block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} */ readonly vhost?: RabbitmqSecretBackendRoleVhost[] | cdktf.IResolvable; /** * vhost_topic block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost_topic RabbitmqSecretBackendRole#vhost_topic} */ readonly vhostTopic?: RabbitmqSecretBackendRoleVhostTopic[] | cdktf.IResolvable; } @@ -60,25 +60,25 @@ export interface RabbitmqSecretBackendRoleVhost { /** * The configure permissions for this vhost. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#configure RabbitmqSecretBackendRole#configure} */ readonly configure: string; /** * The vhost to set permissions for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} */ readonly host: string; /** * The read permissions for this vhost. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} */ readonly read: string; /** * The write permissions for this vhost. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} */ readonly write: string; } @@ -271,19 +271,19 @@ export interface RabbitmqSecretBackendRoleVhostTopicVhost { /** * The read permissions for this vhost. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#read RabbitmqSecretBackendRole#read} */ readonly read: string; /** * The vhost to set permissions for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#topic RabbitmqSecretBackendRole#topic} */ readonly topic: string; /** * The write permissions for this vhost. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#write RabbitmqSecretBackendRole#write} */ readonly write: string; } @@ -450,13 +450,13 @@ export interface RabbitmqSecretBackendRoleVhostTopic { /** * The vhost to set permissions for. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#host RabbitmqSecretBackendRole#host} */ readonly host: string; /** * vhost block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#vhost RabbitmqSecretBackendRole#vhost} */ readonly vhost?: RabbitmqSecretBackendRoleVhostTopicVhost[] | cdktf.IResolvable; } @@ -598,7 +598,7 @@ export class RabbitmqSecretBackendRoleVhostTopicList extends cdktf.ComplexList { } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role} */ export class RabbitmqSecretBackendRole extends cdktf.TerraformResource { @@ -614,7 +614,7 @@ export class RabbitmqSecretBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a RabbitmqSecretBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the RabbitmqSecretBackendRole to import - * @param importFromId The id of the existing RabbitmqSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing RabbitmqSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the RabbitmqSecretBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -626,7 +626,7 @@ export class RabbitmqSecretBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend_role vault_rabbitmq_secret_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -637,8 +637,8 @@ export class RabbitmqSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_rabbitmq_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/rabbitmq-secret-backend/README.md b/src/rabbitmq-secret-backend/README.md index 91d5e8a5..a952d1de 100644 --- a/src/rabbitmq-secret-backend/README.md +++ b/src/rabbitmq-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_rabbitmq_secret_backend` -Refer to the Terraform Registry for docs: [`vault_rabbitmq_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend). +Refer to the Terraform Registry for docs: [`vault_rabbitmq_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend). diff --git a/src/rabbitmq-secret-backend/index.ts b/src/rabbitmq-secret-backend/index.ts index 28bc62c5..07f26a93 100644 --- a/src/rabbitmq-secret-backend/index.ts +++ b/src/rabbitmq-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,29 +15,29 @@ export interface RabbitmqSecretBackendConfig extends cdktf.TerraformMetaArgument /** * Specifies the RabbitMQ connection URI. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#connection_uri RabbitmqSecretBackend#connection_uri} */ readonly connectionUri: string; /** * Default lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#default_lease_ttl_seconds RabbitmqSecretBackend#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#description RabbitmqSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#disable_remount RabbitmqSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#id RabbitmqSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -46,55 +46,55 @@ export interface RabbitmqSecretBackendConfig extends cdktf.TerraformMetaArgument /** * Maximum possible lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#max_lease_ttl_seconds RabbitmqSecretBackend#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#namespace RabbitmqSecretBackend#namespace} */ readonly namespace?: string; /** * Specifies the RabbitMQ management administrator password * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password RabbitmqSecretBackend#password} */ readonly password: string; /** * Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#password_policy RabbitmqSecretBackend#password_policy} */ readonly passwordPolicy?: string; /** * The path of the RabbitMQ Secret Backend where the connection should be configured * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#path RabbitmqSecretBackend#path} */ readonly path?: string; /** * Specifies the RabbitMQ management administrator username * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username RabbitmqSecretBackend#username} */ readonly username: string; /** * Template describing how dynamic usernames are generated. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#username_template RabbitmqSecretBackend#username_template} */ readonly usernameTemplate?: string; /** * Specifies whether to verify connection URI, username, and password. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#verify_connection RabbitmqSecretBackend#verify_connection} */ readonly verifyConnection?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend} */ export class RabbitmqSecretBackend extends cdktf.TerraformResource { @@ -110,7 +110,7 @@ export class RabbitmqSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a RabbitmqSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the RabbitmqSecretBackend to import - * @param importFromId The id of the existing RabbitmqSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing RabbitmqSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the RabbitmqSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -122,7 +122,7 @@ export class RabbitmqSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rabbitmq_secret_backend vault_rabbitmq_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -133,8 +133,8 @@ export class RabbitmqSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_rabbitmq_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/raft-autopilot/README.md b/src/raft-autopilot/README.md index 542d7bfd..b530e897 100644 --- a/src/raft-autopilot/README.md +++ b/src/raft-autopilot/README.md @@ -1,3 +1,3 @@ # `vault_raft_autopilot` -Refer to the Terraform Registry for docs: [`vault_raft_autopilot`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot). +Refer to the Terraform Registry for docs: [`vault_raft_autopilot`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot). diff --git a/src/raft-autopilot/index.ts b/src/raft-autopilot/index.ts index d2354f16..272b38bf 100644 --- a/src/raft-autopilot/index.ts +++ b/src/raft-autopilot/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,23 +15,23 @@ export interface RaftAutopilotConfig extends cdktf.TerraformMetaArguments { /** * Specifies whether to remove dead server nodes periodically or when a new server joins. This requires that min-quorum is also set. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#cleanup_dead_servers RaftAutopilot#cleanup_dead_servers} */ readonly cleanupDeadServers?: boolean | cdktf.IResolvable; /** * Limit the amount of time a server can go without leader contact before being considered failed. This only takes effect when cleanup_dead_servers is set. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#dead_server_last_contact_threshold RaftAutopilot#dead_server_last_contact_threshold} */ readonly deadServerLastContactThreshold?: string; /** * Disables automatically upgrading Vault using autopilot. (Enterprise-only) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#disable_upgrade_migration RaftAutopilot#disable_upgrade_migration} */ readonly disableUpgradeMigration?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#id RaftAutopilot#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#id RaftAutopilot#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,37 +40,37 @@ export interface RaftAutopilotConfig extends cdktf.TerraformMetaArguments { /** * Limit the amount of time a server can go without leader contact before being considered unhealthy. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#last_contact_threshold RaftAutopilot#last_contact_threshold} */ readonly lastContactThreshold?: string; /** * Maximum number of log entries in the Raft log that a server can be behind its leader before being considered unhealthy. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#max_trailing_logs RaftAutopilot#max_trailing_logs} */ readonly maxTrailingLogs?: number; /** * Minimum number of servers allowed in a cluster before autopilot can prune dead servers. This should at least be 3. Applicable only for voting nodes. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#min_quorum RaftAutopilot#min_quorum} */ readonly minQuorum?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#namespace RaftAutopilot#namespace} */ readonly namespace?: string; /** * Minimum amount of time a server must be stable in the 'healthy' state before being added to the cluster. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#server_stabilization_time RaftAutopilot#server_stabilization_time} */ readonly serverStabilizationTime?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot vault_raft_autopilot} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot vault_raft_autopilot} */ export class RaftAutopilot extends cdktf.TerraformResource { @@ -86,7 +86,7 @@ export class RaftAutopilot extends cdktf.TerraformResource { * Generates CDKTF code for importing a RaftAutopilot resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the RaftAutopilot to import - * @param importFromId The id of the existing RaftAutopilot that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing RaftAutopilot that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the RaftAutopilot to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -98,7 +98,7 @@ export class RaftAutopilot extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_autopilot vault_raft_autopilot} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_autopilot vault_raft_autopilot} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -109,8 +109,8 @@ export class RaftAutopilot extends cdktf.TerraformResource { terraformResourceType: 'vault_raft_autopilot', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/raft-snapshot-agent-config/README.md b/src/raft-snapshot-agent-config/README.md index 9daca071..c4d43c9f 100644 --- a/src/raft-snapshot-agent-config/README.md +++ b/src/raft-snapshot-agent-config/README.md @@ -1,3 +1,3 @@ # `vault_raft_snapshot_agent_config` -Refer to the Terraform Registry for docs: [`vault_raft_snapshot_agent_config`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config). +Refer to the Terraform Registry for docs: [`vault_raft_snapshot_agent_config`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config). diff --git a/src/raft-snapshot-agent-config/index.ts b/src/raft-snapshot-agent-config/index.ts index a4439880..e25f4aa8 100644 --- a/src/raft-snapshot-agent-config/index.ts +++ b/src/raft-snapshot-agent-config/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,131 +15,131 @@ export interface RaftSnapshotAgentConfigConfig extends cdktf.TerraformMetaArgume /** * AWS access key ID. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_access_key_id RaftSnapshotAgentConfig#aws_access_key_id} */ readonly awsAccessKeyId?: string; /** * S3 bucket to write snapshots to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_bucket RaftSnapshotAgentConfig#aws_s3_bucket} */ readonly awsS3Bucket?: string; /** * Disable TLS for the S3 endpoint. This should only be used for testing purposes. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_disable_tls RaftSnapshotAgentConfig#aws_s3_disable_tls} */ readonly awsS3DisableTls?: boolean | cdktf.IResolvable; /** * Use KMS to encrypt bucket contents. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_enable_kms RaftSnapshotAgentConfig#aws_s3_enable_kms} */ readonly awsS3EnableKms?: boolean | cdktf.IResolvable; /** * AWS endpoint. This is typically only set when using a non-AWS S3 implementation like Minio. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_endpoint RaftSnapshotAgentConfig#aws_s3_endpoint} */ readonly awsS3Endpoint?: string; /** * Use the endpoint/bucket URL style instead of bucket.endpoint. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_force_path_style RaftSnapshotAgentConfig#aws_s3_force_path_style} */ readonly awsS3ForcePathStyle?: boolean | cdktf.IResolvable; /** * Use named KMS key, when aws_s3_enable_kms=true * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_kms_key RaftSnapshotAgentConfig#aws_s3_kms_key} */ readonly awsS3KmsKey?: string; /** * AWS region bucket is in. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_region RaftSnapshotAgentConfig#aws_s3_region} */ readonly awsS3Region?: string; /** * Use AES256 to encrypt bucket contents. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_s3_server_side_encryption RaftSnapshotAgentConfig#aws_s3_server_side_encryption} */ readonly awsS3ServerSideEncryption?: boolean | cdktf.IResolvable; /** * AWS secret access key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_secret_access_key RaftSnapshotAgentConfig#aws_secret_access_key} */ readonly awsSecretAccessKey?: string; /** * AWS session token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#aws_session_token RaftSnapshotAgentConfig#aws_session_token} */ readonly awsSessionToken?: string; /** * Azure account key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_key RaftSnapshotAgentConfig#azure_account_key} */ readonly azureAccountKey?: string; /** * Azure account name. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_account_name RaftSnapshotAgentConfig#azure_account_name} */ readonly azureAccountName?: string; /** * Azure blob environment. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_blob_environment RaftSnapshotAgentConfig#azure_blob_environment} */ readonly azureBlobEnvironment?: string; /** * Azure container name to write snapshots to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_container_name RaftSnapshotAgentConfig#azure_container_name} */ readonly azureContainerName?: string; /** * Azure blob storage endpoint. This is typically only set when using a non-Azure implementation like Azurite. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#azure_endpoint RaftSnapshotAgentConfig#azure_endpoint} */ readonly azureEndpoint?: string; /** * The file or object name of snapshot files will start with this string. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#file_prefix RaftSnapshotAgentConfig#file_prefix} */ readonly filePrefix?: string; /** * Disable TLS for the GCS endpoint. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_disable_tls RaftSnapshotAgentConfig#google_disable_tls} */ readonly googleDisableTls?: boolean | cdktf.IResolvable; /** * GCS endpoint. This is typically only set when using a non-Google GCS implementation like fake-gcs-server. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_endpoint RaftSnapshotAgentConfig#google_endpoint} */ readonly googleEndpoint?: string; /** * GCS bucket to write snapshots to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_gcs_bucket RaftSnapshotAgentConfig#google_gcs_bucket} */ readonly googleGcsBucket?: string; /** * Google service account key in JSON format. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#google_service_account_key RaftSnapshotAgentConfig#google_service_account_key} */ readonly googleServiceAccountKey?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#id RaftSnapshotAgentConfig#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -148,49 +148,49 @@ export interface RaftSnapshotAgentConfigConfig extends cdktf.TerraformMetaArgume /** * Number of seconds between snapshots. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#interval_seconds RaftSnapshotAgentConfig#interval_seconds} */ readonly intervalSeconds: number; /** * The maximum space, in bytes, to use for snapshots. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#local_max_space RaftSnapshotAgentConfig#local_max_space} */ readonly localMaxSpace?: number; /** * Name of the snapshot agent configuration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#name RaftSnapshotAgentConfig#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#namespace RaftSnapshotAgentConfig#namespace} */ readonly namespace?: string; /** * The directory or bucket prefix to to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#path_prefix RaftSnapshotAgentConfig#path_prefix} */ readonly pathPrefix: string; /** * How many snapshots are to be kept. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#retain RaftSnapshotAgentConfig#retain} */ readonly retain?: number; /** * What storage service to send snapshots to. One of "local", "azure-blob", "aws-s3", or "google-gcs". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#storage_type RaftSnapshotAgentConfig#storage_type} */ readonly storageType: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config} */ export class RaftSnapshotAgentConfig extends cdktf.TerraformResource { @@ -206,7 +206,7 @@ export class RaftSnapshotAgentConfig extends cdktf.TerraformResource { * Generates CDKTF code for importing a RaftSnapshotAgentConfig resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the RaftSnapshotAgentConfig to import - * @param importFromId The id of the existing RaftSnapshotAgentConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing RaftSnapshotAgentConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the RaftSnapshotAgentConfig to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -218,7 +218,7 @@ export class RaftSnapshotAgentConfig extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/raft_snapshot_agent_config vault_raft_snapshot_agent_config} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -229,8 +229,8 @@ export class RaftSnapshotAgentConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_raft_snapshot_agent_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/rgp-policy/README.md b/src/rgp-policy/README.md index ba2d27a2..1007a3da 100644 --- a/src/rgp-policy/README.md +++ b/src/rgp-policy/README.md @@ -1,3 +1,3 @@ # `vault_rgp_policy` -Refer to the Terraform Registry for docs: [`vault_rgp_policy`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy). +Refer to the Terraform Registry for docs: [`vault_rgp_policy`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy). diff --git a/src/rgp-policy/index.ts b/src/rgp-policy/index.ts index bf17c743..eeeb8698 100644 --- a/src/rgp-policy/index.ts +++ b/src/rgp-policy/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface RgpPolicyConfig extends cdktf.TerraformMetaArguments { /** * Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#enforcement_level RgpPolicy#enforcement_level} */ readonly enforcementLevel: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#id RgpPolicy#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#id RgpPolicy#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface RgpPolicyConfig extends cdktf.TerraformMetaArguments { /** * Name of the policy * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#name RgpPolicy#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#name RgpPolicy#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#namespace RgpPolicy#namespace} */ readonly namespace?: string; /** * The policy document * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#policy RgpPolicy#policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#policy RgpPolicy#policy} */ readonly policy: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy vault_rgp_policy} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy vault_rgp_policy} */ export class RgpPolicy extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class RgpPolicy extends cdktf.TerraformResource { * Generates CDKTF code for importing a RgpPolicy resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the RgpPolicy to import - * @param importFromId The id of the existing RgpPolicy that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing RgpPolicy that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the RgpPolicy to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class RgpPolicy extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/rgp_policy vault_rgp_policy} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/rgp_policy vault_rgp_policy} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class RgpPolicy extends cdktf.TerraformResource { terraformResourceType: 'vault_rgp_policy', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/saml-auth-backend-role/README.md b/src/saml-auth-backend-role/README.md index 1fd88754..41ed8741 100644 --- a/src/saml-auth-backend-role/README.md +++ b/src/saml-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_saml_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_saml_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_saml_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role). diff --git a/src/saml-auth-backend-role/index.ts b/src/saml-auth-backend-role/index.ts index d937c765..84633460 100644 --- a/src/saml-auth-backend-role/index.ts +++ b/src/saml-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface SamlAuthBackendRoleConfig extends cdktf.TerraformMetaArguments /** * Mapping of attribute names to values that are expected to exist in the SAML assertion. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes SamlAuthBackendRole#bound_attributes} */ readonly boundAttributes?: { [key: string]: string }; /** * The type of matching assertion to perform on bound_attributes. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_attributes_type SamlAuthBackendRole#bound_attributes_type} */ readonly boundAttributesType?: string; /** * The subject being asserted for SAML authentication. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects SamlAuthBackendRole#bound_subjects} */ readonly boundSubjects?: string[]; /** * The type of matching assertion to perform on bound_subjects. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#bound_subjects_type SamlAuthBackendRole#bound_subjects_type} */ readonly boundSubjectsType?: string; /** * The attribute to use to identify the set of groups to which the user belongs. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#groups_attribute SamlAuthBackendRole#groups_attribute} */ readonly groupsAttribute?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#id SamlAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,79 +52,79 @@ export interface SamlAuthBackendRoleConfig extends cdktf.TerraformMetaArguments /** * Unique name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#name SamlAuthBackendRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#namespace SamlAuthBackendRole#namespace} */ readonly namespace?: string; /** * Path where SAML Auth engine is mounted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#path SamlAuthBackendRole#path} */ readonly path: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_bound_cidrs SamlAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_explicit_max_ttl SamlAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_max_ttl SamlAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_no_default_policy SamlAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_num_uses SamlAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_period SamlAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_policies SamlAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_ttl SamlAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#token_type SamlAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role} */ export class SamlAuthBackendRole extends cdktf.TerraformResource { @@ -140,7 +140,7 @@ export class SamlAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a SamlAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SamlAuthBackendRole to import - * @param importFromId The id of the existing SamlAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SamlAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SamlAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -152,7 +152,7 @@ export class SamlAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend_role vault_saml_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -163,8 +163,8 @@ export class SamlAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_saml_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/saml-auth-backend/README.md b/src/saml-auth-backend/README.md index 8d799ff7..9b94a0c3 100644 --- a/src/saml-auth-backend/README.md +++ b/src/saml-auth-backend/README.md @@ -1,3 +1,3 @@ # `vault_saml_auth_backend` -Refer to the Terraform Registry for docs: [`vault_saml_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend). +Refer to the Terraform Registry for docs: [`vault_saml_auth_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend). diff --git a/src/saml-auth-backend/index.ts b/src/saml-auth-backend/index.ts index 6071bcc7..c4558a77 100644 --- a/src/saml-auth-backend/index.ts +++ b/src/saml-auth-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,29 +15,29 @@ export interface SamlAuthBackendConfig extends cdktf.TerraformMetaArguments { /** * The well-formatted URLs of your Assertion Consumer Service (ACS) that should receive a response from the identity provider. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#acs_urls SamlAuthBackend#acs_urls} */ readonly acsUrls: string[]; /** * The role to use if no role is provided during login. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#default_role SamlAuthBackend#default_role} */ readonly defaultRole?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#disable_remount SamlAuthBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** * The entity ID of the SAML authentication service provider. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#entity_id SamlAuthBackend#entity_id} */ readonly entityId: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#id SamlAuthBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -46,49 +46,49 @@ export interface SamlAuthBackendConfig extends cdktf.TerraformMetaArguments { /** * The PEM encoded certificate of the identity provider. Mutually exclusive with 'idp_metadata_url' * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_cert SamlAuthBackend#idp_cert} */ readonly idpCert?: string; /** * The entity ID of the identity provider. Mutually exclusive with 'idp_metadata_url'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_entity_id SamlAuthBackend#idp_entity_id} */ readonly idpEntityId?: string; /** * The metadata URL of the identity provider. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_metadata_url SamlAuthBackend#idp_metadata_url} */ readonly idpMetadataUrl?: string; /** * The SSO URL of the identity provider. Mutually exclusive with 'idp_metadata_url'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#idp_sso_url SamlAuthBackend#idp_sso_url} */ readonly idpSsoUrl?: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#namespace SamlAuthBackend#namespace} */ readonly namespace?: string; /** * Unique name of the auth backend to configure. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#path SamlAuthBackend#path} */ readonly path?: string; /** * Log additional, potentially sensitive information during the SAML exchange according to the current logging level. Not recommended for production. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#verbose_logging SamlAuthBackend#verbose_logging} */ readonly verboseLogging?: boolean | cdktf.IResolvable; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend vault_saml_auth_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend vault_saml_auth_backend} */ export class SamlAuthBackend extends cdktf.TerraformResource { @@ -104,7 +104,7 @@ export class SamlAuthBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a SamlAuthBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SamlAuthBackend to import - * @param importFromId The id of the existing SamlAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SamlAuthBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SamlAuthBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -116,7 +116,7 @@ export class SamlAuthBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/saml_auth_backend vault_saml_auth_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/saml_auth_backend vault_saml_auth_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -127,8 +127,8 @@ export class SamlAuthBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_saml_auth_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/secrets-sync-association/README.md b/src/secrets-sync-association/README.md index 6501ba83..3eb950de 100644 --- a/src/secrets-sync-association/README.md +++ b/src/secrets-sync-association/README.md @@ -1,3 +1,3 @@ # `vault_secrets_sync_association` -Refer to the Terraform Registry for docs: [`vault_secrets_sync_association`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association). +Refer to the Terraform Registry for docs: [`vault_secrets_sync_association`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association). diff --git a/src/secrets-sync-association/index.ts b/src/secrets-sync-association/index.ts index 6a1e8cd8..b562343f 100644 --- a/src/secrets-sync-association/index.ts +++ b/src/secrets-sync-association/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface SecretsSyncAssociationConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#id SecretsSyncAssociation#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,37 +22,37 @@ export interface SecretsSyncAssociationConfig extends cdktf.TerraformMetaArgumen /** * Specifies the mount where the secret is located. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#mount SecretsSyncAssociation#mount} */ readonly mount: string; /** * Name of the destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#name SecretsSyncAssociation#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#namespace SecretsSyncAssociation#namespace} */ readonly namespace?: string; /** * Specifies the name of the secret to synchronize. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#secret_name SecretsSyncAssociation#secret_name} */ readonly secretName: string; /** * Type of sync destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#type SecretsSyncAssociation#type} */ readonly type: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association vault_secrets_sync_association} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association vault_secrets_sync_association} */ export class SecretsSyncAssociation extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class SecretsSyncAssociation extends cdktf.TerraformResource { * Generates CDKTF code for importing a SecretsSyncAssociation resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SecretsSyncAssociation to import - * @param importFromId The id of the existing SecretsSyncAssociation that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SecretsSyncAssociation that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SecretsSyncAssociation to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class SecretsSyncAssociation extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_association vault_secrets_sync_association} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_association vault_secrets_sync_association} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class SecretsSyncAssociation extends cdktf.TerraformResource { terraformResourceType: 'vault_secrets_sync_association', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/secrets-sync-aws-destination/README.md b/src/secrets-sync-aws-destination/README.md index b4a05be9..add77b36 100644 --- a/src/secrets-sync-aws-destination/README.md +++ b/src/secrets-sync-aws-destination/README.md @@ -1,3 +1,3 @@ # `vault_secrets_sync_aws_destination` -Refer to the Terraform Registry for docs: [`vault_secrets_sync_aws_destination`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination). +Refer to the Terraform Registry for docs: [`vault_secrets_sync_aws_destination`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination). diff --git a/src/secrets-sync-aws-destination/index.ts b/src/secrets-sync-aws-destination/index.ts index b7cfd210..8c28b868 100644 --- a/src/secrets-sync-aws-destination/index.ts +++ b/src/secrets-sync-aws-destination/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,23 @@ export interface SecretsSyncAwsDestinationConfig extends cdktf.TerraformMetaArgu /** * Access key id to authenticate against the AWS secrets manager. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#access_key_id SecretsSyncAwsDestination#access_key_id} */ readonly accessKeyId?: string; /** * Custom tags to set on the secret managed at the destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#custom_tags SecretsSyncAwsDestination#custom_tags} */ readonly customTags?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id} + * Extra protection that must match the trust policy granting access to the AWS IAM role ARN. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#external_id SecretsSyncAwsDestination#external_id} + */ + readonly externalId?: string; + /** + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#id SecretsSyncAwsDestination#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,37 +40,43 @@ export interface SecretsSyncAwsDestinationConfig extends cdktf.TerraformMetaArgu /** * Unique name of the AWS destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#name SecretsSyncAwsDestination#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#namespace SecretsSyncAwsDestination#namespace} */ readonly namespace?: string; /** * Region where to manage the secrets manager entries. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#region SecretsSyncAwsDestination#region} */ readonly region?: string; /** + * Specifies a role to assume when connecting to AWS. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#role_arn SecretsSyncAwsDestination#role_arn} + */ + readonly roleArn?: string; + /** * Secret access key to authenticate against the AWS secrets manager. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_access_key SecretsSyncAwsDestination#secret_access_key} */ readonly secretAccessKey?: string; /** * Template describing how to generate external secret names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#secret_name_template SecretsSyncAwsDestination#secret_name_template} */ readonly secretNameTemplate?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination} */ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { @@ -80,7 +92,7 @@ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { * Generates CDKTF code for importing a SecretsSyncAwsDestination resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SecretsSyncAwsDestination to import - * @param importFromId The id of the existing SecretsSyncAwsDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SecretsSyncAwsDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SecretsSyncAwsDestination to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +104,7 @@ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_aws_destination vault_secrets_sync_aws_destination} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +115,8 @@ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { terraformResourceType: 'vault_secrets_sync_aws_destination', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -116,10 +128,12 @@ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { }); this._accessKeyId = config.accessKeyId; this._customTags = config.customTags; + this._externalId = config.externalId; this._id = config.id; this._name = config.name; this._namespace = config.namespace; this._region = config.region; + this._roleArn = config.roleArn; this._secretAccessKey = config.secretAccessKey; this._secretNameTemplate = config.secretNameTemplate; } @@ -160,6 +174,22 @@ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { return this._customTags; } + // external_id - computed: false, optional: true, required: false + private _externalId?: string; + public get externalId() { + return this.getStringAttribute('external_id'); + } + public set externalId(value: string) { + this._externalId = value; + } + public resetExternalId() { + this._externalId = undefined; + } + // Temporarily expose input value. Use with caution. + public get externalIdInput() { + return this._externalId; + } + // id - computed: true, optional: true, required: false private _id?: string; public get id() { @@ -221,6 +251,22 @@ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { return this._region; } + // role_arn - computed: false, optional: true, required: false + private _roleArn?: string; + public get roleArn() { + return this.getStringAttribute('role_arn'); + } + public set roleArn(value: string) { + this._roleArn = value; + } + public resetRoleArn() { + this._roleArn = undefined; + } + // Temporarily expose input value. Use with caution. + public get roleArnInput() { + return this._roleArn; + } + // secret_access_key - computed: false, optional: true, required: false private _secretAccessKey?: string; public get secretAccessKey() { @@ -266,10 +312,12 @@ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { return { access_key_id: cdktf.stringToTerraform(this._accessKeyId), custom_tags: cdktf.hashMapper(cdktf.stringToTerraform)(this._customTags), + external_id: cdktf.stringToTerraform(this._externalId), id: cdktf.stringToTerraform(this._id), name: cdktf.stringToTerraform(this._name), namespace: cdktf.stringToTerraform(this._namespace), region: cdktf.stringToTerraform(this._region), + role_arn: cdktf.stringToTerraform(this._roleArn), secret_access_key: cdktf.stringToTerraform(this._secretAccessKey), secret_name_template: cdktf.stringToTerraform(this._secretNameTemplate), }; @@ -289,6 +337,12 @@ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { type: "map", storageClassType: "stringMap", }, + external_id: { + value: cdktf.stringToHclTerraform(this._externalId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, id: { value: cdktf.stringToHclTerraform(this._id), isBlock: false, @@ -313,6 +367,12 @@ export class SecretsSyncAwsDestination extends cdktf.TerraformResource { type: "simple", storageClassType: "string", }, + role_arn: { + value: cdktf.stringToHclTerraform(this._roleArn), + isBlock: false, + type: "simple", + storageClassType: "string", + }, secret_access_key: { value: cdktf.stringToHclTerraform(this._secretAccessKey), isBlock: false, diff --git a/src/secrets-sync-azure-destination/README.md b/src/secrets-sync-azure-destination/README.md index 1b0749e1..3955e718 100644 --- a/src/secrets-sync-azure-destination/README.md +++ b/src/secrets-sync-azure-destination/README.md @@ -1,3 +1,3 @@ # `vault_secrets_sync_azure_destination` -Refer to the Terraform Registry for docs: [`vault_secrets_sync_azure_destination`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination). +Refer to the Terraform Registry for docs: [`vault_secrets_sync_azure_destination`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination). diff --git a/src/secrets-sync-azure-destination/index.ts b/src/secrets-sync-azure-destination/index.ts index be52b702..9450647e 100644 --- a/src/secrets-sync-azure-destination/index.ts +++ b/src/secrets-sync-azure-destination/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,29 +15,29 @@ export interface SecretsSyncAzureDestinationConfig extends cdktf.TerraformMetaAr /** * Client ID of an Azure app registration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_id SecretsSyncAzureDestination#client_id} */ readonly clientId?: string; /** * Client Secret of an Azure app registration. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#client_secret SecretsSyncAzureDestination#client_secret} */ readonly clientSecret?: string; /** * Specifies a cloud for the client. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#cloud SecretsSyncAzureDestination#cloud} */ readonly cloud?: string; /** * Custom tags to set on the secret managed at the destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#custom_tags SecretsSyncAzureDestination#custom_tags} */ readonly customTags?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#id SecretsSyncAzureDestination#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -46,37 +46,37 @@ export interface SecretsSyncAzureDestinationConfig extends cdktf.TerraformMetaAr /** * URI of an existing Azure Key Vault instance. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#key_vault_uri SecretsSyncAzureDestination#key_vault_uri} */ readonly keyVaultUri?: string; /** * Unique name of the Azure destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#name SecretsSyncAzureDestination#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#namespace SecretsSyncAzureDestination#namespace} */ readonly namespace?: string; /** * Template describing how to generate external secret names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#secret_name_template SecretsSyncAzureDestination#secret_name_template} */ readonly secretNameTemplate?: string; /** * ID of the target Azure tenant. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#tenant_id SecretsSyncAzureDestination#tenant_id} */ readonly tenantId?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination} */ export class SecretsSyncAzureDestination extends cdktf.TerraformResource { @@ -92,7 +92,7 @@ export class SecretsSyncAzureDestination extends cdktf.TerraformResource { * Generates CDKTF code for importing a SecretsSyncAzureDestination resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SecretsSyncAzureDestination to import - * @param importFromId The id of the existing SecretsSyncAzureDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SecretsSyncAzureDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SecretsSyncAzureDestination to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -104,7 +104,7 @@ export class SecretsSyncAzureDestination extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_azure_destination vault_secrets_sync_azure_destination} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -115,8 +115,8 @@ export class SecretsSyncAzureDestination extends cdktf.TerraformResource { terraformResourceType: 'vault_secrets_sync_azure_destination', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/secrets-sync-config/README.md b/src/secrets-sync-config/README.md index 32842fca..01496c93 100644 --- a/src/secrets-sync-config/README.md +++ b/src/secrets-sync-config/README.md @@ -1,3 +1,3 @@ # `vault_secrets_sync_config` -Refer to the Terraform Registry for docs: [`vault_secrets_sync_config`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config). +Refer to the Terraform Registry for docs: [`vault_secrets_sync_config`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config). diff --git a/src/secrets-sync-config/index.ts b/src/secrets-sync-config/index.ts index 1cf2806b..5b87e53b 100644 --- a/src/secrets-sync-config/index.ts +++ b/src/secrets-sync-config/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface SecretsSyncConfigConfig extends cdktf.TerraformMetaArguments { /** * Disables the syncing process between Vault and external destinations. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#disabled SecretsSyncConfig#disabled} */ readonly disabled?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#id SecretsSyncConfig#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface SecretsSyncConfigConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#namespace SecretsSyncConfig#namespace} */ readonly namespace?: string; /** * Maximum number of pending sync operations allowed on the queue. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#queue_capacity SecretsSyncConfig#queue_capacity} */ readonly queueCapacity?: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config vault_secrets_sync_config} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config vault_secrets_sync_config} */ export class SecretsSyncConfig extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class SecretsSyncConfig extends cdktf.TerraformResource { * Generates CDKTF code for importing a SecretsSyncConfig resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SecretsSyncConfig to import - * @param importFromId The id of the existing SecretsSyncConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SecretsSyncConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SecretsSyncConfig to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class SecretsSyncConfig extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_config vault_secrets_sync_config} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_config vault_secrets_sync_config} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class SecretsSyncConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_secrets_sync_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/secrets-sync-gcp-destination/README.md b/src/secrets-sync-gcp-destination/README.md index c4bc38e1..f86114fa 100644 --- a/src/secrets-sync-gcp-destination/README.md +++ b/src/secrets-sync-gcp-destination/README.md @@ -1,3 +1,3 @@ # `vault_secrets_sync_gcp_destination` -Refer to the Terraform Registry for docs: [`vault_secrets_sync_gcp_destination`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination). +Refer to the Terraform Registry for docs: [`vault_secrets_sync_gcp_destination`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination). diff --git a/src/secrets-sync-gcp-destination/index.ts b/src/secrets-sync-gcp-destination/index.ts index 8487c506..9314445d 100644 --- a/src/secrets-sync-gcp-destination/index.ts +++ b/src/secrets-sync-gcp-destination/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface SecretsSyncGcpDestinationConfig extends cdktf.TerraformMetaArgu /** * JSON-encoded credentials to use to connect to GCP. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#credentials SecretsSyncGcpDestination#credentials} */ readonly credentials?: string; /** * Custom tags to set on the secret managed at the destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#custom_tags SecretsSyncGcpDestination#custom_tags} */ readonly customTags?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#id SecretsSyncGcpDestination#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,25 +34,31 @@ export interface SecretsSyncGcpDestinationConfig extends cdktf.TerraformMetaArgu /** * Unique name of the GCP destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#name SecretsSyncGcpDestination#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#namespace SecretsSyncGcpDestination#namespace} */ readonly namespace?: string; /** + * The target project to manage secrets in. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#project_id SecretsSyncGcpDestination#project_id} + */ + readonly projectId?: string; + /** * Template describing how to generate external secret names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#secret_name_template SecretsSyncGcpDestination#secret_name_template} */ readonly secretNameTemplate?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination} */ export class SecretsSyncGcpDestination extends cdktf.TerraformResource { @@ -68,7 +74,7 @@ export class SecretsSyncGcpDestination extends cdktf.TerraformResource { * Generates CDKTF code for importing a SecretsSyncGcpDestination resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SecretsSyncGcpDestination to import - * @param importFromId The id of the existing SecretsSyncGcpDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SecretsSyncGcpDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SecretsSyncGcpDestination to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +86,7 @@ export class SecretsSyncGcpDestination extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gcp_destination vault_secrets_sync_gcp_destination} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +97,8 @@ export class SecretsSyncGcpDestination extends cdktf.TerraformResource { terraformResourceType: 'vault_secrets_sync_gcp_destination', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -107,6 +113,7 @@ export class SecretsSyncGcpDestination extends cdktf.TerraformResource { this._id = config.id; this._name = config.name; this._namespace = config.namespace; + this._projectId = config.projectId; this._secretNameTemplate = config.secretNameTemplate; } @@ -191,6 +198,22 @@ export class SecretsSyncGcpDestination extends cdktf.TerraformResource { return this._namespace; } + // project_id - computed: false, optional: true, required: false + private _projectId?: string; + public get projectId() { + return this.getStringAttribute('project_id'); + } + public set projectId(value: string) { + this._projectId = value; + } + public resetProjectId() { + this._projectId = undefined; + } + // Temporarily expose input value. Use with caution. + public get projectIdInput() { + return this._projectId; + } + // secret_name_template - computed: true, optional: true, required: false private _secretNameTemplate?: string; public get secretNameTemplate() { @@ -223,6 +246,7 @@ export class SecretsSyncGcpDestination extends cdktf.TerraformResource { id: cdktf.stringToTerraform(this._id), name: cdktf.stringToTerraform(this._name), namespace: cdktf.stringToTerraform(this._namespace), + project_id: cdktf.stringToTerraform(this._projectId), secret_name_template: cdktf.stringToTerraform(this._secretNameTemplate), }; } @@ -259,6 +283,12 @@ export class SecretsSyncGcpDestination extends cdktf.TerraformResource { type: "simple", storageClassType: "string", }, + project_id: { + value: cdktf.stringToHclTerraform(this._projectId), + isBlock: false, + type: "simple", + storageClassType: "string", + }, secret_name_template: { value: cdktf.stringToHclTerraform(this._secretNameTemplate), isBlock: false, diff --git a/src/secrets-sync-gh-destination/README.md b/src/secrets-sync-gh-destination/README.md index 3b95d855..a6664a8f 100644 --- a/src/secrets-sync-gh-destination/README.md +++ b/src/secrets-sync-gh-destination/README.md @@ -1,3 +1,3 @@ # `vault_secrets_sync_gh_destination` -Refer to the Terraform Registry for docs: [`vault_secrets_sync_gh_destination`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination). +Refer to the Terraform Registry for docs: [`vault_secrets_sync_gh_destination`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination). diff --git a/src/secrets-sync-gh-destination/index.ts b/src/secrets-sync-gh-destination/index.ts index 59242b25..6e7c89b4 100644 --- a/src/secrets-sync-gh-destination/index.ts +++ b/src/secrets-sync-gh-destination/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,50 +15,62 @@ export interface SecretsSyncGhDestinationConfig extends cdktf.TerraformMetaArgum /** * Fine-grained or personal access token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#access_token SecretsSyncGhDestination#access_token} */ readonly accessToken?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id} + * The user-defined name of the GitHub App configuration. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#app_name SecretsSyncGhDestination#app_name} + */ + readonly appName?: string; + /** + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#id SecretsSyncGhDestination#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. */ readonly id?: string; /** + * The ID of the installation generated by GitHub when the app referenced by the app_name was installed in the user’s GitHub account. Necessary if the app_name field is also provided. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#installation_id SecretsSyncGhDestination#installation_id} + */ + readonly installationId?: number; + /** * Unique name of the github destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#name SecretsSyncGhDestination#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#namespace SecretsSyncGhDestination#namespace} */ readonly namespace?: string; /** * Name of the repository. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_name SecretsSyncGhDestination#repository_name} */ readonly repositoryName?: string; /** * GitHub organization or username that owns the repository. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#repository_owner SecretsSyncGhDestination#repository_owner} */ readonly repositoryOwner?: string; /** * Template describing how to generate external secret names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#secret_name_template SecretsSyncGhDestination#secret_name_template} */ readonly secretNameTemplate?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination} */ export class SecretsSyncGhDestination extends cdktf.TerraformResource { @@ -74,7 +86,7 @@ export class SecretsSyncGhDestination extends cdktf.TerraformResource { * Generates CDKTF code for importing a SecretsSyncGhDestination resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SecretsSyncGhDestination to import - * @param importFromId The id of the existing SecretsSyncGhDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SecretsSyncGhDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SecretsSyncGhDestination to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -86,7 +98,7 @@ export class SecretsSyncGhDestination extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_gh_destination vault_secrets_sync_gh_destination} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -97,8 +109,8 @@ export class SecretsSyncGhDestination extends cdktf.TerraformResource { terraformResourceType: 'vault_secrets_sync_gh_destination', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -109,7 +121,9 @@ export class SecretsSyncGhDestination extends cdktf.TerraformResource { forEach: config.forEach }); this._accessToken = config.accessToken; + this._appName = config.appName; this._id = config.id; + this._installationId = config.installationId; this._name = config.name; this._namespace = config.namespace; this._repositoryName = config.repositoryName; @@ -137,6 +151,22 @@ export class SecretsSyncGhDestination extends cdktf.TerraformResource { return this._accessToken; } + // app_name - computed: false, optional: true, required: false + private _appName?: string; + public get appName() { + return this.getStringAttribute('app_name'); + } + public set appName(value: string) { + this._appName = value; + } + public resetAppName() { + this._appName = undefined; + } + // Temporarily expose input value. Use with caution. + public get appNameInput() { + return this._appName; + } + // id - computed: true, optional: true, required: false private _id?: string; public get id() { @@ -153,6 +183,22 @@ export class SecretsSyncGhDestination extends cdktf.TerraformResource { return this._id; } + // installation_id - computed: false, optional: true, required: false + private _installationId?: number; + public get installationId() { + return this.getNumberAttribute('installation_id'); + } + public set installationId(value: number) { + this._installationId = value; + } + public resetInstallationId() { + this._installationId = undefined; + } + // Temporarily expose input value. Use with caution. + public get installationIdInput() { + return this._installationId; + } + // name - computed: false, optional: false, required: true private _name?: string; public get name() { @@ -242,7 +288,9 @@ export class SecretsSyncGhDestination extends cdktf.TerraformResource { protected synthesizeAttributes(): { [name: string]: any } { return { access_token: cdktf.stringToTerraform(this._accessToken), + app_name: cdktf.stringToTerraform(this._appName), id: cdktf.stringToTerraform(this._id), + installation_id: cdktf.numberToTerraform(this._installationId), name: cdktf.stringToTerraform(this._name), namespace: cdktf.stringToTerraform(this._namespace), repository_name: cdktf.stringToTerraform(this._repositoryName), @@ -259,12 +307,24 @@ export class SecretsSyncGhDestination extends cdktf.TerraformResource { type: "simple", storageClassType: "string", }, + app_name: { + value: cdktf.stringToHclTerraform(this._appName), + isBlock: false, + type: "simple", + storageClassType: "string", + }, id: { value: cdktf.stringToHclTerraform(this._id), isBlock: false, type: "simple", storageClassType: "string", }, + installation_id: { + value: cdktf.numberToHclTerraform(this._installationId), + isBlock: false, + type: "simple", + storageClassType: "number", + }, name: { value: cdktf.stringToHclTerraform(this._name), isBlock: false, diff --git a/src/secrets-sync-github-apps/README.md b/src/secrets-sync-github-apps/README.md new file mode 100644 index 00000000..2ecae728 --- /dev/null +++ b/src/secrets-sync-github-apps/README.md @@ -0,0 +1,3 @@ +# `vault_secrets_sync_github_apps` + +Refer to the Terraform Registry for docs: [`vault_secrets_sync_github_apps`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps). diff --git a/src/secrets-sync-github-apps/index.ts b/src/secrets-sync-github-apps/index.ts new file mode 100644 index 00000000..68994cec --- /dev/null +++ b/src/secrets-sync-github-apps/index.ts @@ -0,0 +1,237 @@ +/** + * Copyright (c) HashiCorp, Inc. + * SPDX-License-Identifier: MPL-2.0 + */ + +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps +// generated from terraform resource schema + +import { Construct } from 'constructs'; +import * as cdktf from 'cdktf'; + +// Configuration + +export interface SecretsSyncGithubAppsConfig extends cdktf.TerraformMetaArguments { + /** + * The GitHub application ID. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#app_id SecretsSyncGithubApps#app_id} + */ + readonly appId: number; + /** + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#id SecretsSyncGithubApps#id} + * + * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. + * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. + */ + readonly id?: string; + /** + * The user-defined name of the GitHub App configuration. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#name SecretsSyncGithubApps#name} + */ + readonly name: string; + /** + * Target namespace. (requires Enterprise) + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#namespace SecretsSyncGithubApps#namespace} + */ + readonly namespace?: string; + /** + * The content of a PEM formatted private key generated on GitHub for the app. + * + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#private_key SecretsSyncGithubApps#private_key} + */ + readonly privateKey: string; +} + +/** +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps vault_secrets_sync_github_apps} +*/ +export class SecretsSyncGithubApps extends cdktf.TerraformResource { + + // ================= + // STATIC PROPERTIES + // ================= + public static readonly tfResourceType = "vault_secrets_sync_github_apps"; + + // ============== + // STATIC Methods + // ============== + /** + * Generates CDKTF code for importing a SecretsSyncGithubApps resource upon running "cdktf plan " + * @param scope The scope in which to define this construct + * @param importToId The construct id used in the generated config for the SecretsSyncGithubApps to import + * @param importFromId The id of the existing SecretsSyncGithubApps that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps#import import section} in the documentation of this resource for the id to use + * @param provider? Optional instance of the provider where the SecretsSyncGithubApps to import is found + */ + public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { + return new cdktf.ImportableResource(scope, importToId, { terraformResourceType: "vault_secrets_sync_github_apps", importId: importFromId, provider }); + } + + // =========== + // INITIALIZER + // =========== + + /** + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_github_apps vault_secrets_sync_github_apps} Resource + * + * @param scope The scope in which to define this construct + * @param id The scoped construct ID. Must be unique amongst siblings in the same scope + * @param options SecretsSyncGithubAppsConfig + */ + public constructor(scope: Construct, id: string, config: SecretsSyncGithubAppsConfig) { + super(scope, id, { + terraformResourceType: 'vault_secrets_sync_github_apps', + terraformGeneratorMetadata: { + providerName: 'vault', + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' + }, + provider: config.provider, + dependsOn: config.dependsOn, + count: config.count, + lifecycle: config.lifecycle, + provisioners: config.provisioners, + connection: config.connection, + forEach: config.forEach + }); + this._appId = config.appId; + this._id = config.id; + this._name = config.name; + this._namespace = config.namespace; + this._privateKey = config.privateKey; + } + + // ========== + // ATTRIBUTES + // ========== + + // app_id - computed: false, optional: false, required: true + private _appId?: number; + public get appId() { + return this.getNumberAttribute('app_id'); + } + public set appId(value: number) { + this._appId = value; + } + // Temporarily expose input value. Use with caution. + public get appIdInput() { + return this._appId; + } + + // fingerprint - computed: true, optional: false, required: false + public get fingerprint() { + return this.getStringAttribute('fingerprint'); + } + + // id - computed: true, optional: true, required: false + private _id?: string; + public get id() { + return this.getStringAttribute('id'); + } + public set id(value: string) { + this._id = value; + } + public resetId() { + this._id = undefined; + } + // Temporarily expose input value. Use with caution. + public get idInput() { + return this._id; + } + + // name - computed: false, optional: false, required: true + private _name?: string; + public get name() { + return this.getStringAttribute('name'); + } + public set name(value: string) { + this._name = value; + } + // Temporarily expose input value. Use with caution. + public get nameInput() { + return this._name; + } + + // namespace - computed: false, optional: true, required: false + private _namespace?: string; + public get namespace() { + return this.getStringAttribute('namespace'); + } + public set namespace(value: string) { + this._namespace = value; + } + public resetNamespace() { + this._namespace = undefined; + } + // Temporarily expose input value. Use with caution. + public get namespaceInput() { + return this._namespace; + } + + // private_key - computed: false, optional: false, required: true + private _privateKey?: string; + public get privateKey() { + return this.getStringAttribute('private_key'); + } + public set privateKey(value: string) { + this._privateKey = value; + } + // Temporarily expose input value. Use with caution. + public get privateKeyInput() { + return this._privateKey; + } + + // ========= + // SYNTHESIS + // ========= + + protected synthesizeAttributes(): { [name: string]: any } { + return { + app_id: cdktf.numberToTerraform(this._appId), + id: cdktf.stringToTerraform(this._id), + name: cdktf.stringToTerraform(this._name), + namespace: cdktf.stringToTerraform(this._namespace), + private_key: cdktf.stringToTerraform(this._privateKey), + }; + } + + protected synthesizeHclAttributes(): { [name: string]: any } { + const attrs = { + app_id: { + value: cdktf.numberToHclTerraform(this._appId), + isBlock: false, + type: "simple", + storageClassType: "number", + }, + id: { + value: cdktf.stringToHclTerraform(this._id), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + name: { + value: cdktf.stringToHclTerraform(this._name), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + namespace: { + value: cdktf.stringToHclTerraform(this._namespace), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + private_key: { + value: cdktf.stringToHclTerraform(this._privateKey), + isBlock: false, + type: "simple", + storageClassType: "string", + }, + }; + + // remove undefined attributes + return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined )) + } +} diff --git a/src/secrets-sync-vercel-destination/README.md b/src/secrets-sync-vercel-destination/README.md index 74259c2c..bb63c0aa 100644 --- a/src/secrets-sync-vercel-destination/README.md +++ b/src/secrets-sync-vercel-destination/README.md @@ -1,3 +1,3 @@ # `vault_secrets_sync_vercel_destination` -Refer to the Terraform Registry for docs: [`vault_secrets_sync_vercel_destination`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination). +Refer to the Terraform Registry for docs: [`vault_secrets_sync_vercel_destination`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination). diff --git a/src/secrets-sync-vercel-destination/index.ts b/src/secrets-sync-vercel-destination/index.ts index e48aef57..6ebda540 100644 --- a/src/secrets-sync-vercel-destination/index.ts +++ b/src/secrets-sync-vercel-destination/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface SecretsSyncVercelDestinationConfig extends cdktf.TerraformMetaA /** * Vercel API access token with the permissions to manage environment variables. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#access_token SecretsSyncVercelDestination#access_token} */ readonly accessToken: string; /** * Deployment environments where the environment variables are available. Accepts 'development', 'preview' & 'production'. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#deployment_environments SecretsSyncVercelDestination#deployment_environments} */ readonly deploymentEnvironments: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#id SecretsSyncVercelDestination#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,37 +34,37 @@ export interface SecretsSyncVercelDestinationConfig extends cdktf.TerraformMetaA /** * Unique name of the Vercel destination. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#name SecretsSyncVercelDestination#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#namespace SecretsSyncVercelDestination#namespace} */ readonly namespace?: string; /** * Project ID where to manage environment variables. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#project_id SecretsSyncVercelDestination#project_id} */ readonly projectId: string; /** * Template describing how to generate external secret names. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#secret_name_template SecretsSyncVercelDestination#secret_name_template} */ readonly secretNameTemplate?: string; /** * Team ID the project belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#team_id SecretsSyncVercelDestination#team_id} */ readonly teamId?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination} */ export class SecretsSyncVercelDestination extends cdktf.TerraformResource { @@ -80,7 +80,7 @@ export class SecretsSyncVercelDestination extends cdktf.TerraformResource { * Generates CDKTF code for importing a SecretsSyncVercelDestination resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SecretsSyncVercelDestination to import - * @param importFromId The id of the existing SecretsSyncVercelDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SecretsSyncVercelDestination that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SecretsSyncVercelDestination to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -92,7 +92,7 @@ export class SecretsSyncVercelDestination extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/secrets_sync_vercel_destination vault_secrets_sync_vercel_destination} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -103,8 +103,8 @@ export class SecretsSyncVercelDestination extends cdktf.TerraformResource { terraformResourceType: 'vault_secrets_sync_vercel_destination', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/ssh-secret-backend-ca/README.md b/src/ssh-secret-backend-ca/README.md index 4e0368f8..74721a5a 100644 --- a/src/ssh-secret-backend-ca/README.md +++ b/src/ssh-secret-backend-ca/README.md @@ -1,3 +1,3 @@ # `vault_ssh_secret_backend_ca` -Refer to the Terraform Registry for docs: [`vault_ssh_secret_backend_ca`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca). +Refer to the Terraform Registry for docs: [`vault_ssh_secret_backend_ca`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca). diff --git a/src/ssh-secret-backend-ca/index.ts b/src/ssh-secret-backend-ca/index.ts index e987aab0..d3ef5b3e 100644 --- a/src/ssh-secret-backend-ca/index.ts +++ b/src/ssh-secret-backend-ca/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface SshSecretBackendCaConfig extends cdktf.TerraformMetaArguments { /** * The path of the SSH Secret Backend where the CA should be configured * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#backend SshSecretBackendCa#backend} */ readonly backend?: string; /** * Whether Vault should generate the signing key pair internally. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#generate_signing_key SshSecretBackendCa#generate_signing_key} */ readonly generateSigningKey?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#id SshSecretBackendCa#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,25 +34,25 @@ export interface SshSecretBackendCaConfig extends cdktf.TerraformMetaArguments { /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#namespace SshSecretBackendCa#namespace} */ readonly namespace?: string; /** * Private key part the SSH CA key pair; required if generate_signing_key is false. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#private_key SshSecretBackendCa#private_key} */ readonly privateKey?: string; /** * Public key part the SSH CA key pair; required if generate_signing_key is false. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#public_key SshSecretBackendCa#public_key} */ readonly publicKey?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca} */ export class SshSecretBackendCa extends cdktf.TerraformResource { @@ -68,7 +68,7 @@ export class SshSecretBackendCa extends cdktf.TerraformResource { * Generates CDKTF code for importing a SshSecretBackendCa resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SshSecretBackendCa to import - * @param importFromId The id of the existing SshSecretBackendCa that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SshSecretBackendCa that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SshSecretBackendCa to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -80,7 +80,7 @@ export class SshSecretBackendCa extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_ca vault_ssh_secret_backend_ca} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -91,8 +91,8 @@ export class SshSecretBackendCa extends cdktf.TerraformResource { terraformResourceType: 'vault_ssh_secret_backend_ca', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/ssh-secret-backend-role/README.md b/src/ssh-secret-backend-role/README.md index f50d32ca..99cfa622 100644 --- a/src/ssh-secret-backend-role/README.md +++ b/src/ssh-secret-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_ssh_secret_backend_role` -Refer to the Terraform Registry for docs: [`vault_ssh_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role). +Refer to the Terraform Registry for docs: [`vault_ssh_secret_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role). diff --git a/src/ssh-secret-backend-role/index.ts b/src/ssh-secret-backend-role/index.ts index 8d969731..de60cd15 100644 --- a/src/ssh-secret-backend-role/index.ts +++ b/src/ssh-secret-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,126 +13,122 @@ import * as cdktf from 'cdktf'; export interface SshSecretBackendRoleConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#algorithm_signer SshSecretBackendRole#algorithm_signer} */ readonly algorithmSigner?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_bare_domains SshSecretBackendRole#allow_bare_domains} */ readonly allowBareDomains?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_host_certificates SshSecretBackendRole#allow_host_certificates} */ readonly allowHostCertificates?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_subdomains SshSecretBackendRole#allow_subdomains} */ readonly allowSubdomains?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_certificates SshSecretBackendRole#allow_user_certificates} */ readonly allowUserCertificates?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allow_user_key_ids SshSecretBackendRole#allow_user_key_ids} */ readonly allowUserKeyIds?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_critical_options SshSecretBackendRole#allowed_critical_options} */ readonly allowedCriticalOptions?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains SshSecretBackendRole#allowed_domains} */ readonly allowedDomains?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_domains_template SshSecretBackendRole#allowed_domains_template} */ readonly allowedDomainsTemplate?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_extensions SshSecretBackendRole#allowed_extensions} */ readonly allowedExtensions?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_lengths SshSecretBackendRole#allowed_user_key_lengths} - */ - readonly allowedUserKeyLengths?: { [key: string]: number }; - /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users SshSecretBackendRole#allowed_users} */ readonly allowedUsers?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_users_template SshSecretBackendRole#allowed_users_template} */ readonly allowedUsersTemplate?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#backend SshSecretBackendRole#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#cidr_list SshSecretBackendRole#cidr_list} */ readonly cidrList?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_critical_options SshSecretBackendRole#default_critical_options} */ readonly defaultCriticalOptions?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_extensions SshSecretBackendRole#default_extensions} */ readonly defaultExtensions?: { [key: string]: string }; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user SshSecretBackendRole#default_user} */ readonly defaultUser?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#default_user_template SshSecretBackendRole#default_user_template} */ readonly defaultUserTemplate?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#id SshSecretBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. */ readonly id?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_id_format SshSecretBackendRole#key_id_format} */ readonly keyIdFormat?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#key_type SshSecretBackendRole#key_type} */ readonly keyType: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#max_ttl SshSecretBackendRole#max_ttl} */ readonly maxTtl?: string; /** * Unique name for the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#name SshSecretBackendRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#namespace SshSecretBackendRole#namespace} */ readonly namespace?: string; /** * Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#not_before_duration SshSecretBackendRole#not_before_duration} */ readonly notBeforeDuration?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#ttl SshSecretBackendRole#ttl} */ readonly ttl?: string; /** * allowed_user_key_config block * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#allowed_user_key_config SshSecretBackendRole#allowed_user_key_config} */ readonly allowedUserKeyConfig?: SshSecretBackendRoleAllowedUserKeyConfig[] | cdktf.IResolvable; } @@ -140,14 +136,14 @@ export interface SshSecretBackendRoleAllowedUserKeyConfig { /** * List of allowed key lengths, vault-1.10 and above * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#lengths SshSecretBackendRole#lengths} */ readonly lengths: number[]; /** * Key type, choices: * rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521 * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#type SshSecretBackendRole#type} */ readonly type: string; } @@ -286,7 +282,7 @@ export class SshSecretBackendRoleAllowedUserKeyConfigList extends cdktf.ComplexL } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role} */ export class SshSecretBackendRole extends cdktf.TerraformResource { @@ -302,7 +298,7 @@ export class SshSecretBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a SshSecretBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SshSecretBackendRole to import - * @param importFromId The id of the existing SshSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SshSecretBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SshSecretBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -314,7 +310,7 @@ export class SshSecretBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/ssh_secret_backend_role vault_ssh_secret_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -325,8 +321,8 @@ export class SshSecretBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_ssh_secret_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -346,7 +342,6 @@ export class SshSecretBackendRole extends cdktf.TerraformResource { this._allowedDomains = config.allowedDomains; this._allowedDomainsTemplate = config.allowedDomainsTemplate; this._allowedExtensions = config.allowedExtensions; - this._allowedUserKeyLengths = config.allowedUserKeyLengths; this._allowedUsers = config.allowedUsers; this._allowedUsersTemplate = config.allowedUsersTemplate; this._backend = config.backend; @@ -530,22 +525,6 @@ export class SshSecretBackendRole extends cdktf.TerraformResource { return this._allowedExtensions; } - // allowed_user_key_lengths - computed: false, optional: true, required: false - private _allowedUserKeyLengths?: { [key: string]: number }; - public get allowedUserKeyLengths() { - return this.getNumberMapAttribute('allowed_user_key_lengths'); - } - public set allowedUserKeyLengths(value: { [key: string]: number }) { - this._allowedUserKeyLengths = value; - } - public resetAllowedUserKeyLengths() { - this._allowedUserKeyLengths = undefined; - } - // Temporarily expose input value. Use with caution. - public get allowedUserKeyLengthsInput() { - return this._allowedUserKeyLengths; - } - // allowed_users - computed: false, optional: true, required: false private _allowedUsers?: string; public get allowedUsers() { @@ -825,7 +804,6 @@ export class SshSecretBackendRole extends cdktf.TerraformResource { allowed_domains: cdktf.stringToTerraform(this._allowedDomains), allowed_domains_template: cdktf.booleanToTerraform(this._allowedDomainsTemplate), allowed_extensions: cdktf.stringToTerraform(this._allowedExtensions), - allowed_user_key_lengths: cdktf.hashMapper(cdktf.numberToTerraform)(this._allowedUserKeyLengths), allowed_users: cdktf.stringToTerraform(this._allowedUsers), allowed_users_template: cdktf.booleanToTerraform(this._allowedUsersTemplate), backend: cdktf.stringToTerraform(this._backend), @@ -908,12 +886,6 @@ export class SshSecretBackendRole extends cdktf.TerraformResource { type: "simple", storageClassType: "string", }, - allowed_user_key_lengths: { - value: cdktf.hashMapperHcl(cdktf.numberToHclTerraform)(this._allowedUserKeyLengths), - isBlock: false, - type: "map", - storageClassType: "numberMap", - }, allowed_users: { value: cdktf.stringToHclTerraform(this._allowedUsers), isBlock: false, diff --git a/src/terraform-cloud-secret-backend/README.md b/src/terraform-cloud-secret-backend/README.md index b239d8f6..e0b1f9c2 100644 --- a/src/terraform-cloud-secret-backend/README.md +++ b/src/terraform-cloud-secret-backend/README.md @@ -1,3 +1,3 @@ # `vault_terraform_cloud_secret_backend` -Refer to the Terraform Registry for docs: [`vault_terraform_cloud_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend). +Refer to the Terraform Registry for docs: [`vault_terraform_cloud_secret_backend`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend). diff --git a/src/terraform-cloud-secret-backend/index.ts b/src/terraform-cloud-secret-backend/index.ts index df357d28..5e7f5280 100644 --- a/src/terraform-cloud-secret-backend/index.ts +++ b/src/terraform-cloud-secret-backend/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,41 +15,41 @@ export interface TerraformCloudSecretBackendConfig extends cdktf.TerraformMetaAr /** * Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#address TerraformCloudSecretBackend#address} */ readonly address?: string; /** * Unique name of the Vault Terraform Cloud mount to configure * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#backend TerraformCloudSecretBackend#backend} */ readonly backend?: string; /** * Specifies the base path for the Terraform Cloud or Enterprise API. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#base_path TerraformCloudSecretBackend#base_path} */ readonly basePath?: string; /** * Default lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#default_lease_ttl_seconds TerraformCloudSecretBackend#default_lease_ttl_seconds} */ readonly defaultLeaseTtlSeconds?: number; /** * Human-friendly description of the mount for the backend. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#description TerraformCloudSecretBackend#description} */ readonly description?: string; /** * If set, opts out of mount migration on path updates. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#disable_remount TerraformCloudSecretBackend#disable_remount} */ readonly disableRemount?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#id TerraformCloudSecretBackend#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -58,25 +58,25 @@ export interface TerraformCloudSecretBackendConfig extends cdktf.TerraformMetaAr /** * Maximum possible lease duration for secrets in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#max_lease_ttl_seconds TerraformCloudSecretBackend#max_lease_ttl_seconds} */ readonly maxLeaseTtlSeconds?: number; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#namespace TerraformCloudSecretBackend#namespace} */ readonly namespace?: string; /** * Specifies the Terraform Cloud access token to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#token TerraformCloudSecretBackend#token} */ readonly token?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend} */ export class TerraformCloudSecretBackend extends cdktf.TerraformResource { @@ -92,7 +92,7 @@ export class TerraformCloudSecretBackend extends cdktf.TerraformResource { * Generates CDKTF code for importing a TerraformCloudSecretBackend resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TerraformCloudSecretBackend to import - * @param importFromId The id of the existing TerraformCloudSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TerraformCloudSecretBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TerraformCloudSecretBackend to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -104,7 +104,7 @@ export class TerraformCloudSecretBackend extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_backend vault_terraform_cloud_secret_backend} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -115,8 +115,8 @@ export class TerraformCloudSecretBackend extends cdktf.TerraformResource { terraformResourceType: 'vault_terraform_cloud_secret_backend', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/terraform-cloud-secret-creds/README.md b/src/terraform-cloud-secret-creds/README.md index f1ae1e9a..f0d256b0 100644 --- a/src/terraform-cloud-secret-creds/README.md +++ b/src/terraform-cloud-secret-creds/README.md @@ -1,3 +1,3 @@ # `vault_terraform_cloud_secret_creds` -Refer to the Terraform Registry for docs: [`vault_terraform_cloud_secret_creds`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds). +Refer to the Terraform Registry for docs: [`vault_terraform_cloud_secret_creds`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds). diff --git a/src/terraform-cloud-secret-creds/index.ts b/src/terraform-cloud-secret-creds/index.ts index 0b41378c..ae541d9d 100644 --- a/src/terraform-cloud-secret-creds/index.ts +++ b/src/terraform-cloud-secret-creds/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface TerraformCloudSecretCredsConfig extends cdktf.TerraformMetaArgu /** * Terraform Cloud secret backend to generate tokens from * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#backend TerraformCloudSecretCreds#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#id TerraformCloudSecretCreds#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface TerraformCloudSecretCredsConfig extends cdktf.TerraformMetaArgu /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#namespace TerraformCloudSecretCreds#namespace} */ readonly namespace?: string; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#role TerraformCloudSecretCreds#role} */ readonly role: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds} */ export class TerraformCloudSecretCreds extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class TerraformCloudSecretCreds extends cdktf.TerraformResource { * Generates CDKTF code for importing a TerraformCloudSecretCreds resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TerraformCloudSecretCreds to import - * @param importFromId The id of the existing TerraformCloudSecretCreds that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TerraformCloudSecretCreds that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TerraformCloudSecretCreds to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class TerraformCloudSecretCreds extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_creds vault_terraform_cloud_secret_creds} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class TerraformCloudSecretCreds extends cdktf.TerraformResource { terraformResourceType: 'vault_terraform_cloud_secret_creds', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/terraform-cloud-secret-role/README.md b/src/terraform-cloud-secret-role/README.md index 1b480d8c..070f1d75 100644 --- a/src/terraform-cloud-secret-role/README.md +++ b/src/terraform-cloud-secret-role/README.md @@ -1,3 +1,3 @@ # `vault_terraform_cloud_secret_role` -Refer to the Terraform Registry for docs: [`vault_terraform_cloud_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role). +Refer to the Terraform Registry for docs: [`vault_terraform_cloud_secret_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role). diff --git a/src/terraform-cloud-secret-role/index.ts b/src/terraform-cloud-secret-role/index.ts index 54bc18ea..641a007c 100644 --- a/src/terraform-cloud-secret-role/index.ts +++ b/src/terraform-cloud-secret-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface TerraformCloudSecretRoleConfig extends cdktf.TerraformMetaArgum /** * The path of the Terraform Cloud Secret Backend the role belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#backend TerraformCloudSecretRole#backend} */ readonly backend?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#id TerraformCloudSecretRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,49 +28,49 @@ export interface TerraformCloudSecretRoleConfig extends cdktf.TerraformMetaArgum /** * Maximum allowed lease for generated credentials. If not set or set to 0, will use system default. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#max_ttl TerraformCloudSecretRole#max_ttl} */ readonly maxTtl?: number; /** * The name of an existing role against which to create this Terraform Cloud credential * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#name TerraformCloudSecretRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#namespace TerraformCloudSecretRole#namespace} */ readonly namespace?: string; /** * Name of the Terraform Cloud or Enterprise organization * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#organization TerraformCloudSecretRole#organization} */ readonly organization?: string; /** * ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#team_id TerraformCloudSecretRole#team_id} */ readonly teamId?: string; /** * Default lease for generated credentials. If not set or set to 0, will use system default. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#ttl TerraformCloudSecretRole#ttl} */ readonly ttl?: number; /** * ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#user_id TerraformCloudSecretRole#user_id} */ readonly userId?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role} */ export class TerraformCloudSecretRole extends cdktf.TerraformResource { @@ -86,7 +86,7 @@ export class TerraformCloudSecretRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a TerraformCloudSecretRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TerraformCloudSecretRole to import - * @param importFromId The id of the existing TerraformCloudSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TerraformCloudSecretRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TerraformCloudSecretRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -98,7 +98,7 @@ export class TerraformCloudSecretRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/terraform_cloud_secret_role vault_terraform_cloud_secret_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -109,8 +109,8 @@ export class TerraformCloudSecretRole extends cdktf.TerraformResource { terraformResourceType: 'vault_terraform_cloud_secret_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/token-auth-backend-role/README.md b/src/token-auth-backend-role/README.md index 5fecad51..90d29f77 100644 --- a/src/token-auth-backend-role/README.md +++ b/src/token-auth-backend-role/README.md @@ -1,3 +1,3 @@ # `vault_token_auth_backend_role` -Refer to the Terraform Registry for docs: [`vault_token_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role). +Refer to the Terraform Registry for docs: [`vault_token_auth_backend_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role). diff --git a/src/token-auth-backend-role/index.ts b/src/token-auth-backend-role/index.ts index 8f5ae95d..50207bea 100644 --- a/src/token-auth-backend-role/index.ts +++ b/src/token-auth-backend-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,35 +15,35 @@ export interface TokenAuthBackendRoleConfig extends cdktf.TerraformMetaArguments /** * Set of allowed entity aliases for this role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_entity_aliases TokenAuthBackendRole#allowed_entity_aliases} */ readonly allowedEntityAliases?: string[]; /** * List of allowed policies for given role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies TokenAuthBackendRole#allowed_policies} */ readonly allowedPolicies?: string[]; /** * Set of allowed policies with glob match for given role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#allowed_policies_glob TokenAuthBackendRole#allowed_policies_glob} */ readonly allowedPoliciesGlob?: string[]; /** * List of disallowed policies for given role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies TokenAuthBackendRole#disallowed_policies} */ readonly disallowedPolicies?: string[]; /** * Set of disallowed policies with glob match for given role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#disallowed_policies_glob TokenAuthBackendRole#disallowed_policies_glob} */ readonly disallowedPoliciesGlob?: string[]; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#id TokenAuthBackendRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -52,91 +52,91 @@ export interface TokenAuthBackendRoleConfig extends cdktf.TerraformMetaArguments /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#namespace TokenAuthBackendRole#namespace} */ readonly namespace?: string; /** * If true, tokens created against this policy will be orphan tokens. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#orphan TokenAuthBackendRole#orphan} */ readonly orphan?: boolean | cdktf.IResolvable; /** * Tokens created against this role will have the given suffix as part of their path in addition to the role name. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#path_suffix TokenAuthBackendRole#path_suffix} */ readonly pathSuffix?: string; /** * Whether to disable the ability of the token to be renewed past its initial TTL. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#renewable TokenAuthBackendRole#renewable} */ readonly renewable?: boolean | cdktf.IResolvable; /** * Name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#role_name TokenAuthBackendRole#role_name} */ readonly roleName: string; /** * Specifies the blocks of IP addresses which are allowed to use the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_bound_cidrs TokenAuthBackendRole#token_bound_cidrs} */ readonly tokenBoundCidrs?: string[]; /** * Generated Token's Explicit Maximum TTL in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_explicit_max_ttl TokenAuthBackendRole#token_explicit_max_ttl} */ readonly tokenExplicitMaxTtl?: number; /** * The maximum lifetime of the generated token * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_max_ttl TokenAuthBackendRole#token_max_ttl} */ readonly tokenMaxTtl?: number; /** * If true, the 'default' policy will not automatically be added to generated tokens * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_no_default_policy TokenAuthBackendRole#token_no_default_policy} */ readonly tokenNoDefaultPolicy?: boolean | cdktf.IResolvable; /** * The maximum number of times a token may be used, a value of zero means unlimited * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_num_uses TokenAuthBackendRole#token_num_uses} */ readonly tokenNumUses?: number; /** * Generated Token's Period * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_period TokenAuthBackendRole#token_period} */ readonly tokenPeriod?: number; /** * Generated Token's Policies * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_policies TokenAuthBackendRole#token_policies} */ readonly tokenPolicies?: string[]; /** * The initial ttl of the token to generate in seconds * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_ttl TokenAuthBackendRole#token_ttl} */ readonly tokenTtl?: number; /** * The type of token to generate, service or batch * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#token_type TokenAuthBackendRole#token_type} */ readonly tokenType?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role} */ export class TokenAuthBackendRole extends cdktf.TerraformResource { @@ -152,7 +152,7 @@ export class TokenAuthBackendRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a TokenAuthBackendRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TokenAuthBackendRole to import - * @param importFromId The id of the existing TokenAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TokenAuthBackendRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TokenAuthBackendRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -164,7 +164,7 @@ export class TokenAuthBackendRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token_auth_backend_role vault_token_auth_backend_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -175,8 +175,8 @@ export class TokenAuthBackendRole extends cdktf.TerraformResource { terraformResourceType: 'vault_token_auth_backend_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/token/README.md b/src/token/README.md index f5328466..b09ced8a 100644 --- a/src/token/README.md +++ b/src/token/README.md @@ -1,3 +1,3 @@ # `vault_token` -Refer to the Terraform Registry for docs: [`vault_token`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token). +Refer to the Terraform Registry for docs: [`vault_token`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token). diff --git a/src/token/index.ts b/src/token/index.ts index a4c8eee4..ba2e242f 100644 --- a/src/token/index.ts +++ b/src/token/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface TokenConfig extends cdktf.TerraformMetaArguments { /** * The display name of the token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#display_name Token#display_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#display_name Token#display_name} */ readonly displayName?: string; /** * The explicit max TTL of the token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#explicit_max_ttl Token#explicit_max_ttl} */ readonly explicitMaxTtl?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#id Token#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#id Token#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,85 +34,85 @@ export interface TokenConfig extends cdktf.TerraformMetaArguments { /** * Metadata to be associated with the token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#metadata Token#metadata} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#metadata Token#metadata} */ readonly metadata?: { [key: string]: string }; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#namespace Token#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#namespace Token#namespace} */ readonly namespace?: string; /** * Flag to disable the default policy. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_default_policy Token#no_default_policy} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_default_policy Token#no_default_policy} */ readonly noDefaultPolicy?: boolean | cdktf.IResolvable; /** * Flag to create a token without parent. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#no_parent Token#no_parent} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#no_parent Token#no_parent} */ readonly noParent?: boolean | cdktf.IResolvable; /** * The number of allowed uses of the token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#num_uses Token#num_uses} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#num_uses Token#num_uses} */ readonly numUses?: number; /** * The period of the token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#period Token#period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#period Token#period} */ readonly period?: string; /** * List of policies. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#policies Token#policies} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#policies Token#policies} */ readonly policies?: string[]; /** * The renew increment. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_increment Token#renew_increment} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_increment Token#renew_increment} */ readonly renewIncrement?: number; /** * The minimum lease to renew token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renew_min_lease Token#renew_min_lease} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renew_min_lease Token#renew_min_lease} */ readonly renewMinLease?: number; /** * Flag to allow the token to be renewed * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#renewable Token#renewable} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#renewable Token#renewable} */ readonly renewable?: boolean | cdktf.IResolvable; /** * The token role name. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#role_name Token#role_name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#role_name Token#role_name} */ readonly roleName?: string; /** * The TTL period of the token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#ttl Token#ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#ttl Token#ttl} */ readonly ttl?: string; /** * The TTL period of the wrapped token. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#wrapping_ttl Token#wrapping_ttl} */ readonly wrappingTtl?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token vault_token} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token vault_token} */ export class Token extends cdktf.TerraformResource { @@ -128,7 +128,7 @@ export class Token extends cdktf.TerraformResource { * Generates CDKTF code for importing a Token resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the Token to import - * @param importFromId The id of the existing Token that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing Token that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the Token to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -140,7 +140,7 @@ export class Token extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/token vault_token} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/token vault_token} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -151,8 +151,8 @@ export class Token extends cdktf.TerraformResource { terraformResourceType: 'vault_token', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/transform-alphabet/README.md b/src/transform-alphabet/README.md index ba8ac073..4eaf7bdb 100644 --- a/src/transform-alphabet/README.md +++ b/src/transform-alphabet/README.md @@ -1,3 +1,3 @@ # `vault_transform_alphabet` -Refer to the Terraform Registry for docs: [`vault_transform_alphabet`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet). +Refer to the Terraform Registry for docs: [`vault_transform_alphabet`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet). diff --git a/src/transform-alphabet/index.ts b/src/transform-alphabet/index.ts index ed0442da..7add8da2 100644 --- a/src/transform-alphabet/index.ts +++ b/src/transform-alphabet/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface TransformAlphabetConfig extends cdktf.TerraformMetaArguments { /** * A string of characters that contains the alphabet set. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#alphabet TransformAlphabet#alphabet} */ readonly alphabet?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#id TransformAlphabet#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#id TransformAlphabet#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,25 +28,25 @@ export interface TransformAlphabetConfig extends cdktf.TerraformMetaArguments { /** * The name of the alphabet. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#name TransformAlphabet#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#name TransformAlphabet#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#namespace TransformAlphabet#namespace} */ readonly namespace?: string; /** * The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#path TransformAlphabet#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#path TransformAlphabet#path} */ readonly path: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet vault_transform_alphabet} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet vault_transform_alphabet} */ export class TransformAlphabet extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class TransformAlphabet extends cdktf.TerraformResource { * Generates CDKTF code for importing a TransformAlphabet resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TransformAlphabet to import - * @param importFromId The id of the existing TransformAlphabet that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TransformAlphabet that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TransformAlphabet to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class TransformAlphabet extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_alphabet vault_transform_alphabet} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_alphabet vault_transform_alphabet} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class TransformAlphabet extends cdktf.TerraformResource { terraformResourceType: 'vault_transform_alphabet', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/transform-role/README.md b/src/transform-role/README.md index 1b543aeb..7b092aa7 100644 --- a/src/transform-role/README.md +++ b/src/transform-role/README.md @@ -1,3 +1,3 @@ # `vault_transform_role` -Refer to the Terraform Registry for docs: [`vault_transform_role`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role). +Refer to the Terraform Registry for docs: [`vault_transform_role`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role). diff --git a/src/transform-role/index.ts b/src/transform-role/index.ts index ebffa4de..a181aba7 100644 --- a/src/transform-role/index.ts +++ b/src/transform-role/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role // generated from terraform resource schema import { Construct } from 'constructs'; @@ -13,7 +13,7 @@ import * as cdktf from 'cdktf'; export interface TransformRoleConfig extends cdktf.TerraformMetaArguments { /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#id TransformRole#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#id TransformRole#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -22,31 +22,31 @@ export interface TransformRoleConfig extends cdktf.TerraformMetaArguments { /** * The name of the role. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#name TransformRole#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#name TransformRole#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#namespace TransformRole#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#namespace TransformRole#namespace} */ readonly namespace?: string; /** * The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#path TransformRole#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#path TransformRole#path} */ readonly path: string; /** * A comma separated string or slice of transformations to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#transformations TransformRole#transformations} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#transformations TransformRole#transformations} */ readonly transformations?: string[]; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role vault_transform_role} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role vault_transform_role} */ export class TransformRole extends cdktf.TerraformResource { @@ -62,7 +62,7 @@ export class TransformRole extends cdktf.TerraformResource { * Generates CDKTF code for importing a TransformRole resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TransformRole to import - * @param importFromId The id of the existing TransformRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TransformRole that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TransformRole to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -74,7 +74,7 @@ export class TransformRole extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_role vault_transform_role} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_role vault_transform_role} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -85,8 +85,8 @@ export class TransformRole extends cdktf.TerraformResource { terraformResourceType: 'vault_transform_role', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/transform-template/README.md b/src/transform-template/README.md index 6221c817..6125c344 100644 --- a/src/transform-template/README.md +++ b/src/transform-template/README.md @@ -1,3 +1,3 @@ # `vault_transform_template` -Refer to the Terraform Registry for docs: [`vault_transform_template`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template). +Refer to the Terraform Registry for docs: [`vault_transform_template`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template). diff --git a/src/transform-template/index.ts b/src/transform-template/index.ts index 53b0cadb..f22b35f4 100644 --- a/src/transform-template/index.ts +++ b/src/transform-template/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,25 +15,25 @@ export interface TransformTemplateConfig extends cdktf.TerraformMetaArguments { /** * The alphabet to use for this template. This is only used during FPE transformations. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#alphabet TransformTemplate#alphabet} */ readonly alphabet?: string; /** * The map of regular expression templates used to customize decoded outputs. * Only applicable to FPE transformations. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#decode_formats TransformTemplate#decode_formats} */ readonly decodeFormats?: { [key: string]: string }; /** * The regular expression template used for encoding values. * Only applicable to FPE transformations. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#encode_format TransformTemplate#encode_format} */ readonly encodeFormat?: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#id TransformTemplate#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#id TransformTemplate#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -42,37 +42,37 @@ export interface TransformTemplateConfig extends cdktf.TerraformMetaArguments { /** * The name of the template. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#name TransformTemplate#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#name TransformTemplate#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#namespace TransformTemplate#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#namespace TransformTemplate#namespace} */ readonly namespace?: string; /** * The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#path TransformTemplate#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#path TransformTemplate#path} */ readonly path: string; /** * The pattern used for matching. Currently, only regular expression pattern is supported. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#pattern TransformTemplate#pattern} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#pattern TransformTemplate#pattern} */ readonly pattern?: string; /** * The pattern type to use for match detection. Currently, only regex is supported. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#type TransformTemplate#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#type TransformTemplate#type} */ readonly type?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template vault_transform_template} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template vault_transform_template} */ export class TransformTemplate extends cdktf.TerraformResource { @@ -88,7 +88,7 @@ export class TransformTemplate extends cdktf.TerraformResource { * Generates CDKTF code for importing a TransformTemplate resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TransformTemplate to import - * @param importFromId The id of the existing TransformTemplate that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TransformTemplate that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TransformTemplate to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -100,7 +100,7 @@ export class TransformTemplate extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_template vault_transform_template} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_template vault_transform_template} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -111,8 +111,8 @@ export class TransformTemplate extends cdktf.TerraformResource { terraformResourceType: 'vault_transform_template', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/transform-transformation/README.md b/src/transform-transformation/README.md index fb584688..811b1d82 100644 --- a/src/transform-transformation/README.md +++ b/src/transform-transformation/README.md @@ -1,3 +1,3 @@ # `vault_transform_transformation` -Refer to the Terraform Registry for docs: [`vault_transform_transformation`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation). +Refer to the Terraform Registry for docs: [`vault_transform_transformation`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation). diff --git a/src/transform-transformation/index.ts b/src/transform-transformation/index.ts index 0b2ee025..ed96bccb 100644 --- a/src/transform-transformation/index.ts +++ b/src/transform-transformation/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,17 +15,17 @@ export interface TransformTransformationConfig extends cdktf.TerraformMetaArgume /** * The set of roles allowed to perform this transformation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#allowed_roles TransformTransformation#allowed_roles} */ readonly allowedRoles?: string[]; /** * If true, this transform can be deleted. Otherwise deletion is blocked while this value remains false. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#deletion_allowed TransformTransformation#deletion_allowed} */ readonly deletionAllowed?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#id TransformTransformation#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#id TransformTransformation#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -34,55 +34,55 @@ export interface TransformTransformationConfig extends cdktf.TerraformMetaArgume /** * The character used to replace data when in masking mode * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#masking_character TransformTransformation#masking_character} */ readonly maskingCharacter?: string; /** * The name of the transformation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#name TransformTransformation#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#name TransformTransformation#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#namespace TransformTransformation#namespace} */ readonly namespace?: string; /** * The mount path for a back-end, for example, the path given in "$ vault auth enable -path=my-aws aws". * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#path TransformTransformation#path} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#path TransformTransformation#path} */ readonly path: string; /** * The name of the template to use. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#template TransformTransformation#template} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#template TransformTransformation#template} */ readonly template?: string; /** * Templates configured for transformation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#templates TransformTransformation#templates} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#templates TransformTransformation#templates} */ readonly templates?: string[]; /** * The source of where the tweak value comes from. Only valid when in FPE mode. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#tweak_source TransformTransformation#tweak_source} */ readonly tweakSource?: string; /** * The type of transformation to perform. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#type TransformTransformation#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#type TransformTransformation#type} */ readonly type?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation vault_transform_transformation} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation vault_transform_transformation} */ export class TransformTransformation extends cdktf.TerraformResource { @@ -98,7 +98,7 @@ export class TransformTransformation extends cdktf.TerraformResource { * Generates CDKTF code for importing a TransformTransformation resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TransformTransformation to import - * @param importFromId The id of the existing TransformTransformation that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TransformTransformation that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TransformTransformation to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -110,7 +110,7 @@ export class TransformTransformation extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transform_transformation vault_transform_transformation} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transform_transformation vault_transform_transformation} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -121,8 +121,8 @@ export class TransformTransformation extends cdktf.TerraformResource { terraformResourceType: 'vault_transform_transformation', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/transit-secret-backend-key/README.md b/src/transit-secret-backend-key/README.md index 210e9349..3d97ee17 100644 --- a/src/transit-secret-backend-key/README.md +++ b/src/transit-secret-backend-key/README.md @@ -1,3 +1,3 @@ # `vault_transit_secret_backend_key` -Refer to the Terraform Registry for docs: [`vault_transit_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key). +Refer to the Terraform Registry for docs: [`vault_transit_secret_backend_key`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key). diff --git a/src/transit-secret-backend-key/index.ts b/src/transit-secret-backend-key/index.ts index 0149de54..ae5d9715 100644 --- a/src/transit-secret-backend-key/index.ts +++ b/src/transit-secret-backend-key/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,53 +15,47 @@ export interface TransitSecretBackendKeyConfig extends cdktf.TerraformMetaArgume /** * If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#allow_plaintext_backup TransitSecretBackendKey#allow_plaintext_backup} */ readonly allowPlaintextBackup?: boolean | cdktf.IResolvable; /** - * Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. - * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_interval TransitSecretBackendKey#auto_rotate_interval} - */ - readonly autoRotateInterval?: number; - /** * Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#auto_rotate_period TransitSecretBackendKey#auto_rotate_period} */ readonly autoRotatePeriod?: number; /** * The Transit secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#backend TransitSecretBackendKey#backend} */ readonly backend: string; /** * Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#convergent_encryption TransitSecretBackendKey#convergent_encryption} */ readonly convergentEncryption?: boolean | cdktf.IResolvable; /** * Specifies if the key is allowed to be deleted. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#deletion_allowed TransitSecretBackendKey#deletion_allowed} */ readonly deletionAllowed?: boolean | cdktf.IResolvable; /** * Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#derived TransitSecretBackendKey#derived} */ readonly derived?: boolean | cdktf.IResolvable; /** * Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#exportable TransitSecretBackendKey#exportable} */ readonly exportable?: boolean | cdktf.IResolvable; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#id TransitSecretBackendKey#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -70,43 +64,43 @@ export interface TransitSecretBackendKeyConfig extends cdktf.TerraformMetaArgume /** * The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#key_size TransitSecretBackendKey#key_size} */ readonly keySize?: number; /** * Minimum key version to use for decryption. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_decryption_version TransitSecretBackendKey#min_decryption_version} */ readonly minDecryptionVersion?: number; /** * Minimum key version to use for encryption * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#min_encryption_version TransitSecretBackendKey#min_encryption_version} */ readonly minEncryptionVersion?: number; /** * Name of the encryption key to create. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#name TransitSecretBackendKey#name} */ readonly name: string; /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#namespace TransitSecretBackendKey#namespace} */ readonly namespace?: string; /** * Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#type TransitSecretBackendKey#type} */ readonly type?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key} */ export class TransitSecretBackendKey extends cdktf.TerraformResource { @@ -122,7 +116,7 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource { * Generates CDKTF code for importing a TransitSecretBackendKey resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TransitSecretBackendKey to import - * @param importFromId The id of the existing TransitSecretBackendKey that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TransitSecretBackendKey that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TransitSecretBackendKey to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -134,7 +128,7 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_backend_key vault_transit_secret_backend_key} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -145,8 +139,8 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource { terraformResourceType: 'vault_transit_secret_backend_key', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, @@ -157,7 +151,6 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource { forEach: config.forEach }); this._allowPlaintextBackup = config.allowPlaintextBackup; - this._autoRotateInterval = config.autoRotateInterval; this._autoRotatePeriod = config.autoRotatePeriod; this._backend = config.backend; this._convergentEncryption = config.convergentEncryption; @@ -193,22 +186,6 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource { return this._allowPlaintextBackup; } - // auto_rotate_interval - computed: true, optional: true, required: false - private _autoRotateInterval?: number; - public get autoRotateInterval() { - return this.getNumberAttribute('auto_rotate_interval'); - } - public set autoRotateInterval(value: number) { - this._autoRotateInterval = value; - } - public resetAutoRotateInterval() { - this._autoRotateInterval = undefined; - } - // Temporarily expose input value. Use with caution. - public get autoRotateIntervalInput() { - return this._autoRotateInterval; - } - // auto_rotate_period - computed: true, optional: true, required: false private _autoRotatePeriod?: number; public get autoRotatePeriod() { @@ -454,7 +431,6 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource { protected synthesizeAttributes(): { [name: string]: any } { return { allow_plaintext_backup: cdktf.booleanToTerraform(this._allowPlaintextBackup), - auto_rotate_interval: cdktf.numberToTerraform(this._autoRotateInterval), auto_rotate_period: cdktf.numberToTerraform(this._autoRotatePeriod), backend: cdktf.stringToTerraform(this._backend), convergent_encryption: cdktf.booleanToTerraform(this._convergentEncryption), @@ -479,12 +455,6 @@ export class TransitSecretBackendKey extends cdktf.TerraformResource { type: "simple", storageClassType: "boolean", }, - auto_rotate_interval: { - value: cdktf.numberToHclTerraform(this._autoRotateInterval), - isBlock: false, - type: "simple", - storageClassType: "number", - }, auto_rotate_period: { value: cdktf.numberToHclTerraform(this._autoRotatePeriod), isBlock: false, diff --git a/src/transit-secret-cache-config/README.md b/src/transit-secret-cache-config/README.md index b04204af..947399b3 100644 --- a/src/transit-secret-cache-config/README.md +++ b/src/transit-secret-cache-config/README.md @@ -1,3 +1,3 @@ # `vault_transit_secret_cache_config` -Refer to the Terraform Registry for docs: [`vault_transit_secret_cache_config`](https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config). +Refer to the Terraform Registry for docs: [`vault_transit_secret_cache_config`](https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config). diff --git a/src/transit-secret-cache-config/index.ts b/src/transit-secret-cache-config/index.ts index b366e6fa..4ddc5ac6 100644 --- a/src/transit-secret-cache-config/index.ts +++ b/src/transit-secret-cache-config/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config +// https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,11 +15,11 @@ export interface TransitSecretCacheConfigConfig extends cdktf.TerraformMetaArgum /** * The Transit secret backend the resource belongs to. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#backend TransitSecretCacheConfig#backend} */ readonly backend: string; /** - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#id TransitSecretCacheConfig#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -28,19 +28,19 @@ export interface TransitSecretCacheConfigConfig extends cdktf.TerraformMetaArgum /** * Target namespace. (requires Enterprise) * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#namespace TransitSecretCacheConfig#namespace} */ readonly namespace?: string; /** * Number of cache entries. A size of 0 mean unlimited. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#size TransitSecretCacheConfig#size} */ readonly size: number; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config} */ export class TransitSecretCacheConfig extends cdktf.TerraformResource { @@ -56,7 +56,7 @@ export class TransitSecretCacheConfig extends cdktf.TerraformResource { * Generates CDKTF code for importing a TransitSecretCacheConfig resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the TransitSecretCacheConfig to import - * @param importFromId The id of the existing TransitSecretCacheConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing TransitSecretCacheConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the TransitSecretCacheConfig to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -68,7 +68,7 @@ export class TransitSecretCacheConfig extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.25.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/4.0.0/docs/resources/transit_secret_cache_config vault_transit_secret_cache_config} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -79,8 +79,8 @@ export class TransitSecretCacheConfig extends cdktf.TerraformResource { terraformResourceType: 'vault_transit_secret_cache_config', terraformGeneratorMetadata: { providerName: 'vault', - providerVersion: '3.25.0', - providerVersionConstraint: '~> 3.7' + providerVersion: '4.0.0', + providerVersionConstraint: '~> 4.0' }, provider: config.provider, dependsOn: config.dependsOn, diff --git a/src/version.json b/src/version.json index 78eeaf17..eed47861 100644 --- a/src/version.json +++ b/src/version.json @@ -1,3 +1,3 @@ { - "registry.terraform.io/hashicorp/vault": "3.25.0" + "registry.terraform.io/hashicorp/vault": "4.0.0" } diff --git a/yarn.lock b/yarn.lock index e1c663d5..3724644d 100644 --- a/yarn.lock +++ b/yarn.lock @@ -4316,16 +4316,7 @@ streamx@^2.15.0: optionalDependencies: bare-events "^2.2.0" -"string-width-cjs@npm:string-width@^4.2.0": - version "4.2.3" - resolved "https://registry.yarnpkg.com/string-width/-/string-width-4.2.3.tgz#269c7117d27b05ad2e536830a8ec895ef9c6d010" - integrity sha512-wKyQRQpjJ0sIp62ErSZdGsjMJWsap5oRNihHhu6G7JVO/9jIB6UyevL+tXuOqrng8j/cxKTWyWUwvSTriiZz/g== - dependencies: - emoji-regex "^8.0.0" - is-fullwidth-code-point "^3.0.0" - strip-ansi "^6.0.1" - -string-width@^4.0.0, string-width@^4.1.0, string-width@^4.2.0, string-width@^4.2.2, string-width@^4.2.3: +"string-width-cjs@npm:string-width@^4.2.0", string-width@^4.0.0, string-width@^4.1.0, string-width@^4.2.0, string-width@^4.2.2, string-width@^4.2.3: version "4.2.3" resolved "https://registry.yarnpkg.com/string-width/-/string-width-4.2.3.tgz#269c7117d27b05ad2e536830a8ec895ef9c6d010" integrity sha512-wKyQRQpjJ0sIp62ErSZdGsjMJWsap5oRNihHhu6G7JVO/9jIB6UyevL+tXuOqrng8j/cxKTWyWUwvSTriiZz/g== @@ -4403,14 +4394,7 @@ stringify-package@^1.0.1: resolved "https://registry.yarnpkg.com/stringify-package/-/stringify-package-1.0.1.tgz#e5aa3643e7f74d0f28628b72f3dad5cecfc3ba85" integrity sha512-sa4DUQsYciMP1xhKWGuFM04fB0LG/9DlluZoSVywUMRNvzid6XucHK0/90xGxRoHrAaROrcHK1aPKaijCtSrhg== -"strip-ansi-cjs@npm:strip-ansi@^6.0.1": - version "6.0.1" - resolved "https://registry.yarnpkg.com/strip-ansi/-/strip-ansi-6.0.1.tgz#9e26c63d30f53443e9489495b2105d37b67a85d9" - integrity sha512-Y38VPSHcqkFrCpFnQ9vuSXmquuv5oXOKpGeT6aGrr3o3Gc9AlVa6JBfUSOCnbxGGZF+/0ooI7KrPuUSztUdU5A== - dependencies: - ansi-regex "^5.0.1" - -strip-ansi@6.0.1, strip-ansi@^6.0.0, strip-ansi@^6.0.1: +"strip-ansi-cjs@npm:strip-ansi@^6.0.1", strip-ansi@6.0.1, strip-ansi@^6.0.0, strip-ansi@^6.0.1: version "6.0.1" resolved "https://registry.yarnpkg.com/strip-ansi/-/strip-ansi-6.0.1.tgz#9e26c63d30f53443e9489495b2105d37b67a85d9" integrity sha512-Y38VPSHcqkFrCpFnQ9vuSXmquuv5oXOKpGeT6aGrr3o3Gc9AlVa6JBfUSOCnbxGGZF+/0ooI7KrPuUSztUdU5A== @@ -4815,7 +4799,7 @@ workerpool@^6.5.1: resolved "https://registry.yarnpkg.com/workerpool/-/workerpool-6.5.1.tgz#060f73b39d0caf97c6db64da004cd01b4c099544" integrity sha512-Fs4dNYcsdpYSAfVxhnl1L5zTksjvOJxtC5hzMNl+1t9B8hTJTdKDyZ5ju7ztgPy+ft9tBFXoOlDNiOT9WUXZlA== -"wrap-ansi-cjs@npm:wrap-ansi@^7.0.0": +"wrap-ansi-cjs@npm:wrap-ansi@^7.0.0", wrap-ansi@^7.0.0: version "7.0.0" resolved "https://registry.yarnpkg.com/wrap-ansi/-/wrap-ansi-7.0.0.tgz#67e145cff510a6a6984bdf1152911d69d2eb9e43" integrity sha512-YVGIj2kamLSTxw6NsZjoBxfSwsn0ycdesmc4p+Q21c5zPuZ1pl+NfxVdxPtdHvmNVOQ6XSYG4AUtyt/Fi7D16Q== @@ -4833,15 +4817,6 @@ wrap-ansi@^6.0.1, wrap-ansi@^6.2.0: string-width "^4.1.0" strip-ansi "^6.0.0" -wrap-ansi@^7.0.0: - version "7.0.0" - resolved "https://registry.yarnpkg.com/wrap-ansi/-/wrap-ansi-7.0.0.tgz#67e145cff510a6a6984bdf1152911d69d2eb9e43" - integrity sha512-YVGIj2kamLSTxw6NsZjoBxfSwsn0ycdesmc4p+Q21c5zPuZ1pl+NfxVdxPtdHvmNVOQ6XSYG4AUtyt/Fi7D16Q== - dependencies: - ansi-styles "^4.0.0" - string-width "^4.1.0" - strip-ansi "^6.0.0" - wrap-ansi@^8.1.0: version "8.1.0" resolved "https://registry.yarnpkg.com/wrap-ansi/-/wrap-ansi-8.1.0.tgz#56dc22368ee570face1b49819975d9b9a5ead214"